Testing anonymebox from pi3g
The Tor network provides anonymity on the Internet by creating convoluted paths for sending data. The complexity of the paths makes it impossible for website operators to identify a user by IP address. Anonymebox is a pre-configured Tor router based on the Raspberry Pi. The box directs all data from any connected device through Tor, thereby making it easy to achieve more privacy.
Long before the Edward Snowden leaks, it was clear that almost all of our activities on the Internet are being observed. Observation of Internet activity begins with the web server of the web page provider, where all access to the page is recorded, including time and originating IP address. Additionally, almost all webmasters use analytical tools like Google Analytics, and the Like Me buttons embedded in many websites serve to create detailed user profiles on Facebook, Google, and Twitter. As a consequence, many users want to take back control of their information and seek greater anonymity on the Internet. However, this is not necessarily easy to achieve.
Anonymity via Tor
One of the simplest ways to create more privacy is to use Tor, a so-called onion router system [1]. This software directs queries made on the Internet through a veritable forest of servers operated by activists via dynamically created connections. In Tor jargon, each of these way station servers is known as a "node." The anonymization pathway involves three nodes: The data leaves the user's computer in encrypted form and goes to an entry node, where the data is encrypted again and sent on to another Tor node in the network; finally, the data is routed over an exit node and returned to the Internet.
[...]
Buy this article as PDF
Pages: 4
(incl. VAT)