Testing anonymebox from pi3g

Tor Rules of Conduct

Before you become active with Tor, you should first heed a few ground rules on the use of anonymization services. Before connecting to the Tor network, you should close all programs that transmit data in the background to the Internet (e.g., email applications or instant messaging clients). You should also log out of web mailers like Gmail and Outlook.com or social networks like Facebook; otherwise, it will still be possible to create a connection between the websites you visit and your online accounts.

Additionally, it makes sense to install a web browser that you will only use for anonymous surfing, and you should configure it with the highest possible privacy settings similar to the preconfigured Tor Browser. Your anonymous browser should not create a history log. It should delete cookies at least by the time the browser is closed, and it should deactivate plugins like Adobe Flash.

To make these settings in Firefox, go to Preferences | Privacy and choose Firefox will Never remember history in the drop-down box. Under Add-ons | Plugins, click on Shockwave Flash and choose Never Activate from the drop-down.

Tor encrypts your data inside its network of servers. This means that any kind of unencrypted packet may be inspected at the very latest by the exit node. Login data and even passwords would be an easy target for shady exit node operators. Therefore, you should take care if possible always to use encrypted HTTPS connections. The browser add-on HTTPS Everywhere, developed by the Electronic Frontier Foundation [10], allows you to make a detour on many websites to the encrypted version.

Conclusion

Anonymebox provides an easy way to expand your network with anonymous Internet access. On a notebook, you can surf websites anonymously simply by logging in to the anonymebox WiFi access point. To surf without leaving a trace, you need to set up your browser carefully and pay attention to certain rules of conduct. Even anonymebox does not assume this work for you.

Mobile devices, especially, continuously exchange data with the manufacturer's server (e.g., Google, Apple, or Microsoft), who then might be able to create a connection between you and an exit node in spite of using Tor. Therefore, you should do without a corresponding account on a mobile device if you want to use it to surf anonymously.

Buy this article as PDF

Express-Checkout as PDF

Pages: 4

Price $2.95
(incl. VAT)

Buy Raspberry Pi Geek

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Raspberry Pi as a Tor router and web filter

    With a WiFi stick and a few simple steps, you can turn your Raspberry Pi into a Tor proxy that will route all Internet connections from your home network over the anonymous Tor network.

  • Smells Like Maker Spirit

    The maker movement just keeps getting stronger, and open hardware and software are right in the middle, combining electronics, code, construction kits, and bits and pieces of whatever's in the spare parts bin to create something new or remake something old.

  • Create amazing Pi apps without writing code

    Create super easy Pi programs to turn on lights, speak to you, or control motors.

  • Creating a 3G hotspot with the Raspberry Pi

    WiFi is available for free in so many public places that Internet access via a UMTS mobile cellular system would appear to be unnecessary. However, a Raspberry Pi with a UMTS stick can create a personal hotspot that creates independence from public WiFi networks.

  • Turn your Pi into a network monitor and I/O device

    You can create Node-Red web pages to monitor network conditions like hard drive space, network, and CPU loads. Node-Red can also be used to read and set Pi GPIO pins using SNMP.