I build my Ultimate Privacy Kit. (Part 1. Internet Connection Privacy Device(s))

I Build my Ultimate Privacy Kit and I invite you to join me, suggest, advise improvements

I am seeking privacy and security solutions to enhance my online protection. I want to create a Privacy Kit for daily use, and I believe this community can help me achieve that. One crucial aspect is ensuring a private and secure internet connection across all my devices, independent of internet service providers. I have come across a potential solution that claims to provide privacy right out of the box.

The goal is to have control over my online experience without being subjected to the influence or restrictions imposed by Internet service providers, whether they are home Internet providers, mobile operators or not. However, I face the challenge of finding a comprehensive hardware and software solution that can cater to both my home and on-the-go online sessions, providing an ultimate and unique mobile solution.

I’ve found this device - Kryptos Private Modem 4G Wi-Fi providing a Firewall and WireGuard out of the box for protecting your data by using advanced encryption.

I found it interesting and dug more into the research. I also got connected with the team members producing it and this is what I can share now:

Privacy level Built-in VPN and Firewall by default, data encryption :white_check_mark:
Mobility Compact shape small plastic hull with a 5000 mAh battery that ensures uninterrupted autonomous operation for a few hours, useful for a backpack or a small pocket :white_check_mark:
Accessibility Both home and mobile Internet providers are possible :white_check_mark:
Trusted battle test Used for secure internet connection by the president of a country involved in a war :white_check_mark:


  1. Guys, I’m looking forward to hearing your opinions about the device. Let’s take a deep look together, as I’m not as SyberSec tech-savvy yet.

  2. I can also invite a team member producing this type of device for a QA session. Let’s decide if it’s necessary.

  • It’s an interesting device, let’s discuss it more and create a QA with the device producer.

  • I’m skipping this device, not interested

0 voters

1 Like

https://www.gl-inet.com/ makes many similar wireguard capable devices that are great for securing Internet connections using VPN for a small home or business LAN


From what I know about https://www.gl-inet.com/products/gl-xe300/ they produce just a device which is not private and secure as Kryptos Private Modem (KPM)

In short, there’re at least a few features that are not available on the original gl-xe300

  1. Randomization IMEI
  2. Disconnected from www.goodcloud.xyz
  3. White label admin panel and body
  4. IoT module disabled
  5. Built-in VPN with anti-abuse host
  6. Firmware modification with security settings

This is how it’s different and that’s why I consider the Kryptos Private Modem as the solution for the raised privacy issue

Anyway, I think the comparison of devices and emphasising important features should be one of the questions to discuss with KPM suppliers/producers.

Is this usable with an existing internet provider or is it it’s own service you must subscribe to on top of heequioment?

1 Like

Plus you’ve got dVPN nowadays in the likes of Sentinel, Mysterium for example. In my case I route all my traffic throughout servers I have in DC. I use wireguard in OPNsense, and Wireguard app on my phone. Speaking about privacy, don’t forget low tech solutions to block trackers and ads. There’s the famous PiHole project. I use it combined with automated rules on OPNsense. When I’m on the go, I’m thinking about using an Orange Pi or any SBC with 2 Nics as a wireguard gateway. Your Modem has a Great feature: changing at random IMEI.


+1 for Myst, Wireguard, PiHole and OPNsense! :raised_hands: I’ll also add Brave browser for ad blocking (works even on YouTube). :partying_face:


I forget to mention Brave, which I use as well and works great at blocking YouTube ads. If you’re familiar with Linux, there’s possibility to encapsulate Brave of Firefox in a Docker container, everytime you’ll need a fresh install, you spin up a new container. Otherwise at OS level there’s Qubes (https://www.qubes-os.org/) could be nice to talk about privacy oriented Android forks, but I forget most of them…


To me I find digital finger printing is far more invasive, and how you connect to the internet is only a small part of the overall problem.

Sure, you’re device looks good, and I like the IMIE randomisation, but at the end of the day it’s just a VPN. And all they do is change your IP and encrypt your internet traffic. You can use the mentioned device, but if you browse the internet with your laptop or phone, and they can see your device identifiers, operating system, cookies, browser type, browser plugins, screen resolution etc etc and track you quite successfully.

But don’t believe me… Check out https://fingerprint.com/ Then turn off your VPN (or change it to another location) and see if you have the same identifier. It’s a good test to see how well your set up works.

There are a ton of VPN providers out there, and if you are worried about trusting one of them you can always route your traffic through two VPNs. It’s a small part of the overall privacy thing, so no need to over complicate it.

IMHO you’d be better to use systems that spoof many of the things that trackers use to identify you, to create their digital fingerprint. For the IP address you can use a VPN or proxy (or both). Then for device identifiers you have a few options.

The best browsers for this are anti-detect browsers. You can specify your proxy location, operating system, CPU, ram, screen resolution etc etc and the browser will spoof all of these in one session. You can then simultaneously open up many more sessions all with different parameters, making it very hard to link activity between the two. Brave is not an anti-detect browser, but helps somewhat to prevent tracking, but it not nearly as good. It’s worth noting these anti-detect browsers are a paid service and are mainly by affiliate marketers.

And other way to obscure device info is to use some kind of virtual machine. Many options, but Qubes, as brg mentioned before, is a good example.


you can use the device with you local home or mobile provider, no additional fares

1 Like

ok guys, as promised, I got in touch with the CEO of the company providing the device I mentioned in the first post. He’s available on telegram group - https://t.me/+bnRGOzhCSZZjZWYy to answer any questions

cc @slabb @JimJam @brg @Jared @sysfu

1 Like

Where/how does one purchase one of these?

1 Like

I propose to have modem producer for a call (qa session) later this week.
Guys, when and what time would you like to have the call?

1 Like

Hi JamJam! No need to write about fingerprints etc.) sure I know about this but does anybody here want to live such a live like black hackers do?
For real you need to use your iPhone with registered sim-card and Pixel 6a + Graphene OS + Kryptos Modem totally not tailored to your facebook or twitter - if you want to disable fingerprints just use live linux with Ant Browser - each session download and install it to your live system - then use random VMware/Vektor13 kit but all this looks like kink party to the ordinary people )))
We tested a lot of hacking tools and forensics as well and now are able to tell why and what we could use for reducing risks to be hacked by random crypto thieve

1 Like

I was very surprised to see our device here on the video https://www.youtube.com/watch?v=kso0D_-Efs0&t=627s

Good points made here. Another tool for browser fingerprint checking is here:

Although, I would say something like routing traffic through multiple VPNs is a bit overkill. If you need that level of security, your threat model is probably too great to be relying on just VPNs in the first place.

That being said, Tom Spark is a great resource for VPN reviews, and he keeps his tier list up to date:

Most VPNs accept crypto, and if you do it right, you can basically set up and maintain an account anonymously. Recent news on this front, a few weeks ago Mullvad was raided by Swedish police, and didn’t have any records for them to confiscate. So that’s a good look for them.

A few more good meta-resources are:

1 Like

let’s meet for a chat/call using https://meet.jit.si/ next Monday, 29/05 at 15:00 BST

will post an actual call link here on Monday

  • like if you can join

  • comment with your best time if you are not able to join

cc @brg @Jared @slabb @drusin @SSG @JimJam @sysfu and other 8 voters

1 Like

Probably should post some kind of agenda or at least a sentence describing the point/goal of a meeting.

1 Like

For me it’s to talk to the device producer, who can explain all the pros and cons of the modem

@SSG you may add more to the agenda

Hello all! I think the agenda is creating practical privacy kit best solution for crypto nomad - also will discuss cyber defence and cyber offence and its impact on real life - me personally was on demo of iPhone/Android forensics hack and “teamviewer” control as well

I won’t be able to attend unfortunately

1 Like