Testing anonymebox from pi3g
Tor Rules of Conduct
Before you become active with Tor, you should first heed a few ground rules on the use of anonymization services. Before connecting to the Tor network, you should close all programs that transmit data in the background to the Internet (e.g., email applications or instant messaging clients). You should also log out of web mailers like Gmail and Outlook.com or social networks like Facebook; otherwise, it will still be possible to create a connection between the websites you visit and your online accounts.
Additionally, it makes sense to install a web browser that you will only use for anonymous surfing, and you should configure it with the highest possible privacy settings similar to the preconfigured Tor Browser. Your anonymous browser should not create a history log. It should delete cookies at least by the time the browser is closed, and it should deactivate plugins like Adobe Flash.
To make these settings in Firefox, go to Preferences | Privacy and choose Firefox will Never remember history in the drop-down box. Under Add-ons | Plugins, click on Shockwave Flash and choose Never Activate from the drop-down.
Tor encrypts your data inside its network of servers. This means that any kind of unencrypted packet may be inspected at the very latest by the exit node. Login data and even passwords would be an easy target for shady exit node operators. Therefore, you should take care if possible always to use encrypted HTTPS connections. The browser add-on HTTPS Everywhere, developed by the Electronic Frontier Foundation [10], allows you to make a detour on many websites to the encrypted version.
Conclusion
Anonymebox provides an easy way to expand your network with anonymous Internet access. On a notebook, you can surf websites anonymously simply by logging in to the anonymebox WiFi access point. To surf without leaving a trace, you need to set up your browser carefully and pay attention to certain rules of conduct. Even anonymebox does not assume this work for you.
Mobile devices, especially, continuously exchange data with the manufacturer's server (e.g., Google, Apple, or Microsoft), who then might be able to create a connection between you and an exit node in spite of using Tor. Therefore, you should do without a corresponding account on a mobile device if you want to use it to surf anonymously.
Infos
- Tor project: https://www.torproject.org
- Tor Browser: https://www.torproject.org/projects/torbrowser.html.en
- Tails: https://tails.boum.org
- anonymebox: https://anonymebox.com/
- Free download: https://anonymebox.com/free-download-for-raspberry-pi/
- Tor test page: https://check.torproject.org/
- Ipinfo.io: http://ipinfo.io
- Ipleak.net: http://ipleak.net
- Anonymizer of the Chaos Computer Club: http://www.ccc.de/de/anonymizer (in German)
- HTTPS Everywhere: https://www.eff.org/de/https-everywhere
« Previous 1 2 Next »
Buy this article as PDF
Pages: 4
(incl. VAT)