Raspberry PI-based wireless router with TOR

For discussions about security.
Post Reply
Message
Author
User avatar
6502coder
Posts: 677
Joined: Mon 23 Mar 2009, 18:07
Location: Western United States

Raspberry PI-based wireless router with TOR

#1 Post by 6502coder »

Interesting article about browsing anonymous via a Raspberry PI-based wireless router and Linux

http://spectrum.ieee.org/geek-life/hand ... ign=103113

gcmartin

#2 Post by gcmartin »

A click-thru that link, wrote:... It’s no big secret that intelligence operations run exit nodes on the Tor network for the express purpose of traffic analysis. Recent revelations that the US and UK co-operating on data intelligence means that our list of exit node exclusions has expanded to include all countries friendly to US intelligence gathering. Here is the exhaustive list of countries where your data will NOT be exiting and subject to tapping. Don’t worry, that still leave about 140 countries. :-)

Friendly countries to US/UK intelligence
The United States, the United Kingdom, and the British Commonwealth: (Antigua, Australia, Barbuda, Bahamas, Bangladesh, Barbados, Belize, Botswana, Brunei, Cameroon, Canada, Cyprus, Dominica, Ghana, Grenada, Guyana, India, Jamaica, Kenya, Kiribati, Lesotho, Malawi, Malaysia, Maldives, Malta, Mauritius, Mozambique, Namibia, Nauru, New Zealand, Nigeria, Pakistan, Papua New Guinea, Rwanda, Saint Kitts and Nevis, Saint Lucia, Saint Vincent and the Grenadines, Samoa, Seychelles, Sierra Leone, Singapore, Solomon Islands, South Africa, Sri Lanka, Swaziland, Tanzania, Tonga, Trinidad, Tobago, Tuvalu, Uganda, Vanuatu, Zambia) ...
Also, a general warning on that link: wrote:... Tor anonymizes traffic by encrypting it and sending it to a relay. The traffic then bounces around at random within the Tor network until it is decrypted at an exit gateway somewhere around the globe and passed to the Internet at large. The outside world sees the IP address of this exit gateway as your IP address. All this takes time, and the Tor network has only so much bandwidth, so attempting to download a video file, for example, can be an agonizingly slow process.

There are also limits to the veil of anonymity provided. If you transmit identifying information—such as your name—to an external server, then you’ve rendered the system moot. What’s even more insidious is that if you use the same browser for accessing the Tor network as you do for regular surfing, you could be “clickprinted

Post Reply