More and more devices are taken control and either snoop on the network or are used for DDOS attacksDid you miss our previous article... https://techvideos.club/iot-videos/using-a-second-router-for-iot-devices