For this weeks assignment - a prototype of a disobedient electronic object/device - I wanted to build a router that behaves differently from a typical router. There's been plenty of similar projects – thero by roman torre, being radiotropic by tega brain – i've wanted to learn about this stuff for a while so not letting that stop me.

few different ideas --

  • modify data in unencrypted packets to change the meaning on text on websites – in line with fake news and manipulated media and post-truth era
  • redirect google to duckduckgo and ban all http sites (only let https go through) – a router that enforces security. why is the onus on the individual ?
  • redirect all traffic to google, drive home the point that they're tracking pretty much all you do, all activity is going to google anyway

I found this tutorial to set up a pi as an access point and wifi-client simultaneously, which worked. And then I struggled for many hours to understand how iptable routing works and how I could mess with the traffic going through my pi. There's a bunch of tools out there for filtering and security and adblocking – e2guardian, pi-hole, +++ .. but I wanted to figure out what was going on under the hood so I could tamper with it as I wanted.. I watched the tcpdump for a while which was overwhelming. I tried editing my hosts file but it seems requests through the access point don't use the pi's host file.. It seems one way to do this would be to set up a proxy and route everything (or filter) through that – but there's so many fuzzy things and setup-specific, I will wait to get a better understanding of general principles first.

turns out nobody on the floor has a deep understanding of networks, and tom igoe's office hours had all been grabbed until monday – hopefully he can point me in the right direction and shed some light on things..

i connected to my own network! what a cool network! it works just like the normal internet! :|

iptable rules
many many many tabs, no clear answers