I’ve set the Raspberry Pi to connect to Tor on boot,and run a couple of Python scripts 🙂
One posts how long the box has been live, and the temperature it’s running at, the other retweets any mention of SPAM, SPAM, SPAM, SPAM, and EGGS!
If you’re interested here’s the account: @PiCookingTime
I’ll post the code if anyone is interested, although it was all plagiarised from great thinkers online 🙂
So between learning my way around an acoustic guitar and trying to finish the main story of withcer 3 before Metal Gear Solid 5 arrives, I’ve been trying to set up my Raspberry Pi as a VPN router… again 🙂
Here’re a few of the links that have helped my journey
To run the initial config at any time:
With This Tiny Box, You Can Anonymize Everything You Do Online
No tool in existence protects your anonymity on the Web better than the software Tor, which encrypts Internet traffic and bounces it through random computers around the world. But for guarding anything other than Web browsing, Tor has required a mixture of finicky technical setup and software tweaks. Now routing all your traffic through Tor may be as simple as putting a portable hardware condom on your ethernet cable.
Today a group of privacy-focused developers plans to launch a Kickstarter campaign for Anonabox. The $45 open-source router automatically directs all data that connects to it by ethernet or Wifi through the Tor network, hiding the user’s IP address and skirting censorship. It’s also small enough to hide two in a pack of cigarettes. Anonabox’s tiny size means users can carry the device with them anywhere, plugging it into an office ethernet cable to do sensitive work or in a cybercafe in China to evade the Great Firewall. The result, if Anonabox fulfills its security promises, is that it could become significantly easier to anonymize all your traffic with Tor—not just Web browsing, but email, instant messaging, filesharing and all the other miscellaneous digital exhaust that your computer leaves behind online
Tor can also provide anonymity to websites and other servers. Servers configured to receive inbound connections only through Tor are called hidden services. Rather than revealing a server’s IP address (and thus its network location), a hidden service is accessed through its onion address. The Tor network understands these addresses and can route data to and from hidden services, even to those hosted behind firewalls or network address translators (NAT), while preserving the anonymity of both parties. Tor is necessary to access hidden services.
Hidden services have been deployed on the Tor network since 2004. Other than the database that stores the hidden-service descriptors, Tor is decentralized by design; there is no direct readable list of all hidden services, although a number of hidden services catalogue publicly known onion addresses.
Rather than pay a web host (although I love my current provider, the support team are fantastic!) I will host my own data on the darknet.
To keep the costs to a minimum, I wanted a low powered device, as it will be running continuously. I’ve old PC’s and laptops but they still gobble up power, voilà Raspberry Pi.
Tor Project have instructions on how to create an hidden service, and as the device I’ve ordered comes with a trimmed version of Debian, Raspbian, Wheezy, the Linux path should be easy enough to follow… famous last words 🙂
Now eager for the kit to arrive, so I can start to play!