I'm not sure I want someone doing weird things to my file system.
I really hated the way they described what it does. I also disliked the "new technology" to "instantly transfer files, no matter how many".
I have no idea if they've implemented the encryption in any kind of sensible way. I guess we'll hear later if someone breaks it. I guess it's nice that there's more encrypted traffic going over the Internet - regular people using encryption means encrypted traffic is not automatically suspicious and needs the same legal process of warrents to intercept it.
Yes, the real magic here is not the technology....it's their marketing. I'd love to find out the particular shade of lipstick they put on this pig...it would be interesting to know the referrers for the traffic to that page.
I figured that's what it was. I was shopping around for one of those early this year and it looked like they're just not very widespread, and the few models that are easy to get have some serious issues. I decided to get a raspberry pi instead since it is in the same price range and can serve the same purpose, plus a lot more.
The hardware is already made and available. Here's the manf listing for the Wanser-R: (http://www.mrt-communications.com/WANSER-R.html) Here's the Alibaba page for the MRT communications NAS Dongle device (http://www.alibaba.com/product-free/103191249/NAS_Dongle.htm...)
Here's an Amazon listing for something similar (http://www.amazon.com/Addonics-NASU2-NAS-Adapter/dp/B001OC5J...) and the manf page for that (http://www.addonics.com/products/nasu2.php)
I'm not sure I want someone doing weird things to my file system.
I really hated the way they described what it does. I also disliked the "new technology" to "instantly transfer files, no matter how many".
I have no idea if they've implemented the encryption in any kind of sensible way. I guess we'll hear later if someone breaks it. I guess it's nice that there's more encrypted traffic going over the Internet - regular people using encryption means encrypted traffic is not automatically suspicious and needs the same legal process of warrents to intercept it.