← Back to Library

How to secure your network

In an era where a single compromised router can expose a household to identity theft or turn a private IP address into a weapon for global harassment, The Hated One offers a rare, unvarnished guide to digital survival that treats network security not as a niche hobby, but as a civic duty. The piece's most striking claim is that cybersecurity functions like herd immunity: if enough individuals secure their networks, the entire ecosystem becomes harder to target, shifting the burden from individual paranoia to collective defense.

The Herd Immunity of Encryption

The Hated One frames the current digital landscape as one of extreme vulnerability, noting that "if somebody gets into your home network they could potentially collect your private information or send death threats to the President of the United States from your IP address." This stark warning sets the stage for a tutorial that refuses to coddle the reader. The author argues that the cost of inaction is astronomical, pointing out that "by 2021 the global cost of cybercrime will reach six trillion dollars oh and that's six trillion every year." This statistic serves as the piece's emotional anchor, transforming abstract hacking risks into a tangible economic crisis that demands immediate attention.

How to secure your network

The core of the argument rests on the simplicity of the first line of defense. The Hated One writes, "the first step you need to make is to make sure your home network is encrypted and all the full passwords are changed this is a very easy step in the most effective one." This is a powerful reframing of a complex field; by isolating the most impactful actions, the author makes security accessible to non-experts. The guidance is granular, advising users to log into their router's web interface via the default gateway IP address found in their command prompt or network settings. The author emphasizes that "the admin password is not the same as the password you use to log into Wi-Fi," a critical distinction often overlooked by average users who assume one password protects everything.

"Security of computers also has something of an equivalent to herd immunity; if everybody around you has a secure network each individual network is that much more difficult to target."

Critics might argue that relying on individual users to change default credentials is a flawed strategy in a world where default passwords are ubiquitous and often hard to find. However, The Hated One counters this by providing specific, actionable steps for every major operating system, from Windows to Linux, effectively lowering the barrier to entry. The author insists that "encryption however only works with a strong password," urging the creation of a "passphrase that is at least 16 characters long and easily memorable." This advice balances security with usability, a rare feat in technical writing.

Beyond the Default: Firmware and Firewalls

Moving beyond basic password hygiene, the commentary shifts to the often-neglected realm of router firmware and network architecture. The Hated One warns that "older standard WEP encryption has been broken years ago and opting for no encryption leaves our network open for anyone to connect to spy on and exploit." This is a crucial reminder that hardware age is a security liability. The author recommends replacing outdated hardware immediately, stating, "if your router doesn't support this encryption I recommend you buy a more modern router this is absolutely essential."

The piece also tackles the myth of obscurity. Many users believe hiding their network name (SSID) provides safety, but The Hated One debunks this: "hiding your Wi-Fi doesn't stop its broadcast and doesn't make it invisible to network analysis tools which are available for free and require a little skill to operate." Instead, the author suggests changing the SSID to something generic, like a "Marvel movie," to avoid revealing the router's manufacturer or the user's identity. This is a subtle but effective psychological tactic that reduces the attack surface without the inconvenience of manual network entry.

Furthermore, the author addresses the threat of government surveillance and mass collection. "Pretty much all consumer routers ship with proprietary firmware this is a problem if you're worried about government backdoor," The Hated One writes. To counter this, the author recommends installing open-source firmware like OpenWrt, which offers transparency and eliminates "secret government backdoor." This is a bold recommendation for the average user, suggesting that true security requires a level of technical engagement that goes far beyond clicking 'update' in an app.

The Paradox of Public Networks and Mobile Security

The final section of the piece confronts the inherent insecurity of public Wi-Fi. The Hated One takes a hardline stance: "I wouldn't recommend connecting your phone to a public network in a hotel or Airport." The author explains that while Tor and VPNs offer protection, they often disable application firewalls, creating a false sense of security. "Using a VPN or tor on phone will disable your application firewall there is no way around this which makes mobile web browsing way too insecure," the author notes. This is a nuanced take that challenges the common assumption that a VPN is a silver bullet for mobile safety.

For those who must connect, the author suggests using Tor over most commercial VPNs, noting that "the only free VPN I would recommend for this purpose only is proton VPN." However, the ultimate advice is to ditch Wi-Fi entirely for Ethernet connections, even on mobile devices, to eliminate wireless vulnerabilities. "The most secure network is one that doesn't exist," The Hated One concludes, advising users to "ditch Wi-Fi all together and use Ethernet cables for all devices including your phone." This extreme measure is presented not as a requirement for everyone, but as the gold standard for those facing advanced adversaries.

"The most secure network is one that doesn't exist that is why it is most recommended to ditch Wi-Fi all together and use Ethernet cables for all devices including your phone."

While this advice may seem impractical for the average commuter, it highlights a fundamental truth: wireless convenience comes with an inherent trust cost that cannot be fully mitigated by software alone. The Hated One's willingness to present this trade-off without sugarcoating adds significant credibility to the piece.

Bottom Line

The Hated One's commentary succeeds by demystifying the technical jargon of cybersecurity and reframing it as a series of manageable, high-impact actions. The strongest part of the argument is the emphasis on herd immunity, which elevates personal security from a selfish act to a communal responsibility. Its biggest vulnerability lies in the steep learning curve of its advanced recommendations, such as installing open-source firmware or setting up a Pi-hole, which may overwhelm casual users. Readers should watch for the evolution of DNS encryption standards, as the author notes that Microsoft is planning to release support soon, potentially making the most critical security upgrades accessible to the masses without technical tinkering.

Sources

How to secure your network

by The Hated One · The Hated One · Watch video

securing your network is essential but it isn't difficult even if you are not the best friends with technology you'd be surprised how insecure your home network is and how vulnerable you are on an open Wi-Fi if somebody gets into your home network they could potentially collect your private information or send death threats to the President of the United States from your IP address if you connect to a hostile network your phone could be controlled by hackers forever and you wouldn't notice until you lose access to all the records and end up facing insane credit card debt and if you somehow think that cyber security doesn't concern you by 2021 the global cost of cybercrime will reach six trillion dollars oh and that's six trillion every year the visit work security tutorial will be easy the goal is to help as many people as possible secure their networks because security of computers also has something of an equivalent to herd immunity if everybody around you has a secure network each individual network is that much more difficult to target so share this video with your friends and neighbors or just pass on the knowledge to others if you like this security series supported on patreon because YouTube hates me the first step you need to make is to make sure your home network is encrypted and all the full passwords are changed this is a very easy step in the most effective one if you only do this you're already way ead in your security the easiest way to access your router settings is to log into your routers web interface this is usually an IP address of your router you can find a displayed on your router or in the documentation that arrived with it in the original packaging if you can't find it you can also use your PC or phone to get your routers IP address on Mac Linux and mobile devices you can find your routers default gateway in the network settings of your connections on Windows select start and type CMD hit enter and Windows command prompt should pop up in the command prompt type in ipconfig and press Enter if you are connected to your Wi-Fi router wirelessly or through an Ethernet cable your routers IP address will be displayed as default gateway type this IP address - browser URL ...