this post was submitted on 02 Sep 2024
156 points (99.4% liked)

technology

23180 readers
279 users here now

On the road to fully automated luxury gay space communism.

Spreading Linux propaganda since 2020

Rules:

founded 4 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] Camdat@hexbear.net 11 points 2 weeks ago

You can filter by device. Leave your suspect device connected to your network for a few days, filter by destination and review. Also keep an eye on CPU usage.

If your devices have a ton of random outgoing network requests you're already being tracked in a myriad of other ways and need to lock your shit down.

I've done this before, there's not as much network bloat as you might think.