Author

Topic: [WTS] TOR WiFi Router - All Connections through TOR (Read 1522 times)

sr. member
Activity: 308
Merit: 250
Had a cancellation, so have one unit ready to ship within 12hrs, if anyone is interested.
sr. member
Activity: 308
Merit: 250
Thanks!

No, this plugs into your existing router through the ethernet port.
legendary
Activity: 3080
Merit: 1080
I like your UAV; that shit is straight up badass as you say.

As for this router, can it be used as a traditional wired router as well? (assuming one gets a usb ethernet adapter)
sr. member
Activity: 308
Merit: 250
How are DNS or NTP managed?

Raspberry Pi does not have an internal clock, so NTP is synced by default online. Since this is an internet based device (Always connected) this is not an issue.

DNS Traffic is forced through TOR as well.
legendary
Activity: 1974
Merit: 1029
If whatever your using is not TOR compatible (UDP, etc) the connection is rejected.

How are DNS or NTP managed?
sr. member
Activity: 308
Merit: 250
Why do you poses this item and what have you used it for? Was the firmware tampered with?

1 & 2. I made one to test and am hoping to sell some. I feel it's great for those wanting to protect their anyonomity.
2. It's based off Raspberry Pi, standard firmware, running Raspbian
sr. member
Activity: 308
Merit: 250
I am selling TOR Wifi Routers, see link below:
http://www.coingig.com/antimattercrusader/Transparant-TOR-WiFi-Router---All-Connections-through-TOR-4115

Copy & Pasted Details:

This is a custom built TOR Wifi Router, based on Raspberry Pi. If you're not familiar with TOR, check this site: www.torproject.org. TOR, put briefly, a method of protecting your online privacy through anonymity - this is achieved by relying your connections across a networking of volunteer nodes spread across the globe. If you're aware of how to properly use TOR, it should be nearly impossible to track your online activity(see note below) and will allow access to hidden sites/services.

What this device does is simply the process by creating a Wifi Access point. When connected, all connections are routed through TOR automatically with no pain on your end. This is a very secure method for using TOR, as not even your own computer knows it's true location/identity - so traditional software exploits will not be able to break your anonymity. I have tested it myself against a number of malware, such as rats, stealers, and keyloggers - all which record IP, none of which got past this device. It also allows you to use non-Tor software such as skype, outlook, yahoo messenger etc over tor without any additional painful configuration. If you're connected to this WiFi access point, everything is through TOR. If whatever your using is not TOR compatible (UDP, etc) the connection is rejected.

This is assembled in a nice little case, configured, and ready to go. If you have a specific access point name and password in mind, message me, and I can custom configure it for you.

Included:
- TOR Router
- 5v 1a Power Supply
- Ethernet Cable

Shipping is free in the US, or $10 worldwide.

NOTE:
No. 1: Nothing is 100 percent impossible.
No. 2: No technology can protect you from yourself. Please educate yourself on proper TOR use. If you log into your facebook while on TOR and expect to remain anonymous, that's bad mmmmkkkk? (Said like Mr. Mackey) There is a lot to read on Google regarding this topic. Use common sense.
Jump to: