Captive Portal Isolation
Captive portals are systems that require credentials or other personally identifiable information (PII) in exchange for access to the Internet. They are found in airports, malls, libraries, hotels, hospitals, stores, museums, coffee shops etc, and require your to accept their terms and conditions, exposing you to unknown vulnerabilities.
GoSilent isolates the captive portal ensuring your device is never compromised. Your identity is never exposed because the connection never reaches your device or network.
Captive Portal Security Threat
Organizations use captive portals to collect user data. In most cases, the captive portal requires personal information such as your name, email address, social media account or even a credit card number. This personal data is often sold to third parties.
A captive portal is no more secure than a public WiFi network. It controls and monitors your internet behavior. Any interception and alteration of an online connection can be an open door to for undesired monitoring, malware or a cyber attack.
GoSilent utilizes AES 256-bit encryption to protect private user data, keeping it fully encrypted end-to-end.
When a user connects to a WiFi network, GoSilent detects the existence of a captive portal on that WiFi network and automatically redirects the user to the GoSilent captive portal bypass webpage.
The captive portal bypass webpage displays screenshots from an isolated browser in which the user can authenticate with the captive portal. Qualified users are able to access websites that utilize captive portals without the risk of a man-in-the-middle attack, malware, tracking cookies, and intrusive advertising.
With GoSilent’s captive portal isolation, device connections remain safe and secure, and user data is never stored on an intermediary server.
2 Deployment Methods
GoSilent helps global enterprises protect their most precious asset— DATA —wherever it resides.