156
submitted 2 months ago by pooh@hexbear.net to c/technology@hexbear.net
you are viewing a single comment's thread
view the rest of the comments
[-] Camdat@hexbear.net 11 points 2 months ago

You can filter by device. Leave your suspect device connected to your network for a few days, filter by destination and review. Also keep an eye on CPU usage.

If your devices have a ton of random outgoing network requests you're already being tracked in a myriad of other ways and need to lock your shit down.

I've done this before, there's not as much network bloat as you might think.

this post was submitted on 02 Sep 2024
156 points (99.4% liked)

technology

23275 readers
119 users here now

On the road to fully automated luxury gay space communism.

Spreading Linux propaganda since 2020

Rules:

founded 4 years ago
MODERATORS