Before powering on Little Snipper, plug your Ethernet cable to the port labeled WAN on the Little Snipper to a port labeled LAN on your router.
Now plug Little Snipper into the power, either via a USB cable to the USB port on Little Snipper or with wall power. To use wall power, you'll need to fold out the power pins and connect an adaptor if you're outside the US.
NOTE: It takes 30 seconds for the red LED to activate.
After a short while Little Snipper will start blinking, 1 flash every 5 seconds. This indicates idle mode, when Little Snipper is waiting for you to connect.
With your phone, tablet or laptop, look for a WiFi network that matches that written on the sticker on the side of your device. It'll be something like unplug_XXXX, where "XXXX" are 4 letters and/or numbers. Connect to it using the password also found on the sticker, noted down in Step 1.
Once you've connected, visit 10.10.10.1 in your browser. You will be taken to a page that looks like this:
When you're ready, give Little Snipper an email address on which to receive alerts from the device. This step is important and necessary.
Once done, you will have access to the main menu:
There are 3 passwords governing access to Little Snipper:
The most important password is the WiFi password: aside from physical access it governs who can access both the admin menu and command line access altogether. For this reason it's important we change it to one other than the default password seen on the sticker.To change the WiFi password choose wifi. Here you can change not only the WiFi password, but the network name and WiFi channel:
Access to the command line of Little Snipper is only available over the WiFi (whose password you govern) and Ethernet cable on the LAN port. As it's based on OpenWrt, Little Snipper is a single-user system, with a root user behind the ssh port of LAN traffic. In this sense, physical access to the device is a point of vulnerability and so the root password should be strong.
We advise that you change the root password if ever you think Little Snipper has been physically accessed by others you don't trust. In fact, we didn't put the root password on the sticker to significantly reduce the possibility of the device being compromised on the way to you.
To retrieve the unique root password for your device, please email support <at> plugunplug.net, using the email account we've been in touch with before. State your name alongiside the serial number on the sticker. We'll then give you the password for your particular device.
You should then log in immediately and change it using the following commands on a device with ssh (Secure Shell) installed:
NOTE: it is not possible for us to remotely connect to your Little Snipper. Little Snipper's firewall prohibits attempts to log in using the secure shell from outside its LAN. Simply put, we locked ourselves out of your device.
Little Snipper can be used in three different ways:
NOTE: with nothing selected, Little Snipper works as an efficient and secure little WiFi router.
Below we'll cover the modes and their use.
As the name implies, detect sets Little Snipper up as a guard dog, keeping an eye out for wireless devices known to be used to compromise personal privacy. If you have the International Model, you have the option of disconnecting those devices as it finds them, breaking wireless uploads and streams of video, audio and image content to the Internet (or another device, such as a phone in a car outside).
NOTE: Little Snipper will alert by email should it detect something. For this to work, it's important Little Snipper remains connected to the Internet. Long LED pulses indicate a target has been discovered.
Select detect and you will be taken to a screen like so:
Go through and choose the devices you'd like Little Snipper to keep an eye out for, using the drop down menus and toggle buttons:
When finished with your selection, select NEXT.
Now it's here that the US Model and International Model differ:
Sets Little Snipper as an around-the-clock watchdog, looking out for the selected devices.
This tells Little Snipper to sweep once across all WiFi channels looking for the devices you've selected for detection. A sweep cycle takes around 2 minutes.
Choose networks on which to disallow connections. This is useful if, for instance, you have a restaurant or public library and wish to block use of your network by devices known to pose a risk to privacy.
This mode will disconnect devices you've selected on any network they use, including WiFi tethers to phones. After disconnection, Little Snipper will send you an alert by email.This is the only way to 'blind' camera drones on (2.4Ghz) and devices like DropCam and Google Glass. Please note that this mode may not be legal in your given jurisdiction. Use with caution and care.
This mode does no disconnection, detecting devices you've selected and sending you an alert when done.
This tells Little Snipper to sweep once across all WiFi channels looking for the devices you've selected for detection. A sweep cycle takes around 2 minutes. No disconnection is performed.
Now it's time to review the settings and arm Little Snipper. After hitting ARM DEVICE Little Snipper's WiFi will go down as it needs to use its antenna for detection. Check your email and look out for long LED pulses to indicate a target device has been detected.
NOTE: You can connect to Little Snipper over Ethernet on the LAN port to read reports from the detector.
Rather than locking out spies in your physical environment, the encrypt mode is concerned with locking out spies from your Internet traffic.
Little Snipper does this by using a Virtual Private Network , which can be used to route all your traffic from devices connected to Little Snipper over an encrypted tunnel, exiting wherever the VPN server you have chosen resides in the world. This ensures that your traffic is opaque to all the companies, governments and other entities between your device and the VPN server at the exit point, at the other end. More so, it changes the geographical location of your Internet traffic: so, if you are in the USA and using Little Snipper with a Swedish VPN server, you will appear to a website hosted in Australia (or any other country) as a device in Sweden.
NOTE: Encrypting your Internet traffic protects your privacy along the route but does not guarantee your anonymity at the site or service you are resourcing! Your browser fingerprint alone is often unique enough to be correllated with an existing record by the owner/admin of the site you are visiting. For this reason, we recommend using the excellent Tor Browser if the need for anonymity is paramount.
On the premium version of Little Snipper you have two options whereas on the Little Snipper Solo, you have one. These are outlined below:
Here you can upload an Open VPN configuration file you have downloaded from a VPN service provider, your own VPN. Provide the username and password, as required. NOTE: we can't guarantee the security of any third-party service here.
Our Premium cusomters have the option of using the Cyborg Unplug VPN based in Germany. This service includes the unique feature of wrapping the traffic in a stealthy SSL sheath, an encrypted layer that disguises the VPN traffic as standard port 443 traffic (online-banking, Flickr or Google traffic etc).
In doing so, this method evades firewalls that are trained to look for VPN traffic, making it very difficult to detect and block. For this reason, the Cyborg Unplug VPN may be useful in regions where VPN traffic is disallowed, circumventing censorship and non-net-neutral policies.
Here you can upload an OpenVPN configuration file (ends with ovpn) and enter the username and password, as required.
Once you've chosen a VPN to use Little Snipper will attempt to connect to the VPN server. If the connection is successful, you will see something like the following (example shown is connecting to the Cyborg Unplug VPN):