Onion Pi - Convert a Raspberry Pi into a Anonymizing Tor Proxy, for easy anonymous internet browsing


12 Responses to “Onion Pi - Convert a Raspberry Pi into a Anonymizing Tor Proxy, for easy anonymous internet browsing”

  1. TheMudshark says:

    Is there any advantage of using this over installing Tor on your computer? Does it make the routing faster?

    • fuzzyfuzzyfungus says:

      No notable advantage over installing it on your computer with a properly configured firewall; but this arrangement should terminate the attempts of various always-running-in-the-background updaters and whatnot to attempt to phone home in incautious ways.

      You can configure your computer’s firewall to do the same; but the easy-install Tor bundle only handles the browser it includes.

      In that vein, it’s important to remember that whatever you are doing is visible to your Tor exit node(and people running exit nodes for the purposes of seeing what passes by isn’t unheard of). Keep that in mind.

      • weatherman says:

        From what little I know about Tor, it seems like there’s a lot of ways data can leak out whether that’s through unprotected apps, documents or other services. This would prevent that, which is especially important for those for whom a small configuration error could literally mean death. 

        Also, I wonder if this could be used to make a hidden anonymous network simply by plugging it in to a private office or government router – that would be pretty cool. 

        • fuzzyfuzzyfungus says:

          Tor is definitely a tool to be used with caution. I have the greatest respect for the Tor team, they are Pretty Serious; but the fundamental architecture can only protect you from certain things(and, indeed, might make you more vulnerable if you use it incorrectly).

          The other issue(also more or less architectural and fundamental, not ‘you fools! What have you done?) is that Tor traffic looks abnormal. Very, very, weird. You can’t tell exactly what the target is up to, it’s a welter of TLS connections; but it’s instantly recognizable.

          Against a mostly-free-but-surveillance-crazed state like the US, that’s fine. If a state were to ban Tor, period, though, hiding your activity would be much more demanding and difficult.

          • Philosopher Rex says:

             This is why obfsproxy was developed and can be used as a plugin for tor – to disquise the output tor traffic.

    • Jim Schmidt says:

      It might make it faster, by moving the processing off to a separate device. It could also come in handy for devices that can’t run Tor, like your phone or your iThing.

    • Philosopher Rex says:

       If you are using a closed source OS like MS windows, then there can you be sure your firewall is really protecting you from leaking personal information?  A Tor router like Onion Pi or Anonobox FORCES all traffic through Tor including all DNS requests (at least Anonobox does), thus preventing your OS from betraying you.

  2. coop says:

    Also – awesome for sharing a (now) secure’ish connection with a variety of devices, either your own in a hotel room, or with others. Love it.

  3. Halloween_Jack says:

    OT: There really is something called onion pie, although it seems to be more of a quiche.

  4. Michael Kaiser says:

    Just a friendly reminder “….you shouldn’t use TOR for the purposes of secure communications. You should be using TOR to anonymize routing.” 

Leave a Reply