⚓
ISP
Open Waters
Full passthrough. No filtering. Sail free.
👻
Zero Trust
Ghost Cloak
DNS locked to the ship. Tailscale management active.
💀
Double Hop
Dead Man's Route
All LAN traffic through WireGuard. Tailscale stays up for management.
ACTIVE
🏴☠️
Z-HOP
Davy Jones
Maximum stealth. WireGuard + DNS lockdown. Tailscale management only.
Kills DNS resolution if VPN drops in DoubleHop or Z-HOP mode, preventing your traffic from leaking to your ISP.
Protects you from: DNS leaks when your VPN tunnel goes down unexpectedly
ARMED
Routes all DNS queries through Cloudflare's DNS-over-HTTPS (DoH) instead of cleartext. Your ISP can't see what sites you look up.
Protects you from: ISP snooping on your DNS queries and DNS spoofing attacks
DoH ACTIVE
Checks if your DNS queries are leaking outside your VPN tunnel by comparing what resolver Cloudflare sees for local vs direct requests.
Protects you from: Unknowingly exposing your browsing to your ISP while on VPN
Generates a random MAC address for the WiFi AP on each reboot. Uses locally-administered (02:xx) prefix. Takes effect on next reboot.
Protects you from: Device fingerprinting and network tracking across locations
OFF
Controls how often Pi-hole updates its ad/tracker blocklists. Daily catches new threats faster; weekly is lighter on resources.
Protects you from: Ads, trackers, and malicious domains across all devices on your network
Shows all devices currently connected to GhostPort's WiFi network via DHCP.
MacBook-Pro192.168.50.10a4:83:e7:2f:b1:44
Pixel-8-Pro192.168.50.1434:39:16:6f:bf:b8
iPad-Air192.168.50.21f0:18:98:4c:d3:e2
Ring-Doorbell192.168.50.335c:a1:e9:72:0b:aa
Automatically switch security modes on a schedule. For example, switch to Z-HOP every night and back to ISP in the morning.
22:00Sun, Mon, Tue, Wed, Thu, Fri, SatZ-HOP
07:00Mon, Tue, Wed, Thu, FriISP
COMING SOON
Route all traffic through Tor for anonymous browsing
COMING SOON
Chain multiple VPN servers so no single provider sees the full picture
COMING SOON
Put smart devices on a separate network away from your computers
COMING SOON
Watch for suspicious network patterns like malware beacons
COMING SOON
Add dummy traffic to hide your real browsing patterns
COMING SOON
A separate WiFi for visitors that can't see your devices
COMING SOON
Encrypt the router's storage to protect configs if it's stolen