Raspberry Pi Tor proxy lets you take anonymity with you


Your web traffic is being logged at many different levels. There are a few different options to re-implement your privacy (living off the grid excluded), and the Tor network has long been one of the best options. But what about when you’re away from you home setup? Adafruit has your back. They’ve posted a guide which will turn a Raspberry Pi into a portable Tor proxy.

The technique requires an Ethernet connection, but these are usually pretty easy to come by in hotels or relatives’ homes. A bit of work configuring the Linux network components will turn the RPi into a WiFi access point. Connect to it with your laptop or smartphone and you can browse like normal. The RPi will anonymize the IP address for all web traffic.

Leveraging the Tor network for privacy isn’t a new subject for us. We’ve looked at tor acks that go all the way back to the beginnings of Hackaday. The subject comes and goes but the hardware for it just keeps getting better!


  1. J says:

    Very nice! Wouldn’t it be possible to use two wifi dongles? One that connect to an existing wifi network and one to broadcast a secured wifi for your computer?

  2. Per Jensen says:

    “tor acks” ?

  3. Nick says:

    I guess the get acknowledgments from way back at HaD

  4. r3 says:

    I’m not enitrely sure what’s the difference between this and having TOR browser on your unit as a SW setup. Please enlighten me if there is any

    • greenbacks says:

      You have an excuse to carry your rPi around.

    • Dra says:

      You cant really run TOR on most mobile devices, such as cellphones, ipads, kindles, and the like. With this option, you can connect your mobile devices to the internet just as safely as you can your laptop.

      • cantido says:

        >You cant really run TOR on most mobile devices,

        Tor should run one most rooted Android devices.

        • qwerty says:

          Tor has no purpose on pads/cellphones. I would definitely never ever trust any pad or cellphone, rooted or not, for keeping sensitive data or secret communications. Seriously people, those traps contain applications that access all your data and can (will) phone home as soon as they can. Phoning home through Tor doesn’t make them less dangerous when a single app can make a blob of some personal data (you allowed them to) and upload it elsewhere.

          • AndroidCat says:

            With an Android device, you can install the development package, connect the device with USB and then leave the debugger logging all app activity.

            The pre-installed Facebook app on my phone, that I never use and can’t be uninstalled, phones home every night. Eventually I’ll root the phone and rip out that app. Meanwhile facebook.com is blocked at my router.

    • r3, if you are using a Tor proxy like this, all of your traffic over wifi (and then to the Internet) is guranteed to be proxied by Tor. If you are using it in your browser, there are situations where not all browser traffic goes through your proxy and none of your non-browser traffic will go through the proxy for sure.

  5. TehMeh says:

    “The technique requires an Ethernet connection, but these are usually pretty easy to come by in hotels or relatives’ homes.”

    This is a silly statement. Of course you could just do the obvious thing and reverse the forwarding rule and then connect the ethernet side to your PC and the wireless side to the available internet connection.

  6. Dra says:

    It’s interesting, when I first started playing around with tor (mostly out of curiosity, at the time I didn’t really have an over-whelming reason to fear of everything I say and do on the internet being logged) connection speeds were terrible…worse than dialup, generally speaking. At this point, you can do pretty much anything you need to do through it, at somewhat reasonable speeds.

    And the more people who utilize the network, the faster and more stable the network becomes. All to the good, really, given the fact that the real world is often even stranger than most conspiracy theorists would have imagined, online privacy wise.

  7. strider_mt2k says:

    OT, but that is one nice little enclosure.

  8. David says:

    It should be noted that while Tor is a great first step at anonymizing your web traffic, services like WebRTC which use UDP connections in addition to TCP will not be routed through Tor. That’s something I’m currently trying to work around though. ;)

  9. huertanix says:

    It should be noted that while Tor is a great first step at anonymizing your web traffic, services like WebRTC which use UDP connections in addition to TCP will not be routed through Tor. That’s something I’m currently trying to work around though. ;)

  10. zokier says:

    They’re selling this as a $95 kit. I can’t really believe that similarly priced (or even cheaper!) WLAN routers/aps wouldn’t provide significantly better value. Get a TP-link, install OpenWRT and add Tor, should give you similar results, but on a hardware that’s actually designed for networking, and as such most likely has significantly better IO performance.

    This is just one of the things RPi is bit suboptimal for.

  11. GotNoTime says:

    Just be aware that whoever is running the Tor exit node you’re using may be snooping on you as well. They won’t know where the connections are coming from due to how Tor routing works but if your connections aren’t encrypted then they’ll be able to capture the contents.

    TL;DR – Make sure to encrypt everything e.g. SSL and to check that nobody is messing around with the certificates when you’re using Tor.

  12. Solenoid says:

    How about setting up a VPN on that RPi with TOR and leaving it at home, most devices have VPN connectivity implemented (my Android has it) and all you need it send all traffic via your TOR connected RPi at home… or am I missing something?

    • TOR says:

      You are not missing anything. The raspberry pi is a computer, so posting anything software related about it and calling it a “hack” is like telling people that you can install FireFox on your x86 computer.

      • Eirinn says:

        I’m missing the part why i’d go to these lengths to cover my private data. People think they’re special snowflakes, unique one of a kinds. But in reality no-one bothers snooping on you because it’d be boring and pointless…

        • nebulous says:

          Too boring and pointless? That used to be true. Now, we have machines that are capable of sifting through your data, and they don’t get bored. As to whether it’s pointless, I’m sure the multi-million (billion?) dollar PRISM programs were set up as an idle pass-time.

          The US government is spying on its own citizens more so than the KGB ever did (although less heavy handed). The EU isn’t far behind, and is at the same time dealing with a heavy push towards an impopular government-by-decree, rather than having actual representation. Those sorts of circumstances do not point towards the growth of benevolent government.

          What happens when you some day want to exercise your right to protest against government, and instead you’re dragged out of bed the night before, because ‘they’ heard you?

          • Whatnot says:

            Many EU countries are worse than the US actually, they just don’t have the funding the Us has so they can’t match the datacenters, but what they pull is often even more outrageous.
            But from the US it’s more shocking since they come from a starting point where you expect some more limits.

  13. wetomelo says:

    How about using those cheap android media players like MiniX, MK802, whatever, they have WiFi included (and power adapter!!), so if you add another dongle you have a totally wireless system, and are avaliable worldwide via multiple dropshipping pages! and maybe cheap!!

  14. Dan says:

    Or you could just get a regular pi and type sudo apt-get install tor

  15. funnyjester says:

    This almost seems like a gimmick to be honest, sure it will be good to have if your company wont allow you to install anything on their systems. Other than that. I have many openwrt devices I can just throw tor onto.

  16. Anonimus says:

    More importantly: You can’t go on 4chan through tor

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s