A few weeks ago, Anonabox, the ill-conceived router with custom firmware that would protect you from ‘hackers’ and ‘legitimate governments’ drew the ire of tech media. It was discovered that this was simply an off-the-shelf router with an installation of OpenWrt, and the single common thread in the controversy was that, ‘anyone can build that. This guy isn’t doing anything new.’
Finally, someone who didn’t have the terrible idea of grabbing another off the shelf router and putting it up on Kickstarter is doing just that. [Adam] didn’t like the shortcomings of the Anonabox and looked at the best practices of staying anonymous online. He created a Tor dongle in response to this with a Beaglebone Black.
Instead of using wireless like the Anonabox and dozens of other projects, [Andy] is using the Beaglebone as a dongle/Ethernet adapter with all data passed to the computer through the USB port. No, it doesn’t protect your entire network; only a single device and only when it’s plugged in.
The installation process is as simple as installing all the relevent software, uninstalling all the cruft, and configuring a browser. [Adam] was able to get 7Mb/sec down and 250kb/sec up through his Tor-ified Ethernet adapter while only using 40% of the BBB’s CPU.
29 thoughts on “A Better Anonabox With The Beaglebone Black”
Its just too bad that using tor and or linux will get you flagged as a possible domestic terrorist by the NSA. Tor can’t be trusted anyways. The majority of the exit nodes are setup just for the purpose of tracking tor users. Ever notice how slow tor was.. then all of the sudden.. Exit nodes everywhere.. yeah.. Gonna have to find another solution to escape the prying eyes of hysterically paranoid and murderous governments.
It’s really sad. Russian proxies are probably more trustworthy than US TOR exit nodes.
Cant we just all be friends and hug each other?
common pickpocketing technique
Still, as long as one node is honest, the system should work. TOR can release packets in random orders to fight traffic analysis, to a certain extent.
just use anon vpn’s with no logs on top of that based in countries like iran etc.
yeah relying on unaccountable strangers for your security is the way to go
Unfortunately it’s better than relying on businesses in “democratic” countries. If you need privacy from the TLAs, countries that hate, or at least enjoy laughing at, the USA, are the way to go.
“countries that hate, or at least enjoy laughing at, the USA, are the way to go.”
So basically every single country in the world…
Then you did not see the news of a russian TOR exit that was attaching malware to every file it was requested to download……
I’m pretty sure just visiting Hackaday gets you flagged, most of us here probably have between 2-5 flags on going.
It that doesn’t then going to cryptome.org or wikileaks.org will for sure.
behaving in an intelligent manner on the internet will get you flagged
Not really. Hackaday is not worth flagging. Anybody that would do something dangerous to the nation that is dumb enough to go to a site called Hackaday is in the random wacko range. Too much noise to filter trying to catch the random wackos. Frankly their are just too many of them but most are so inept as to be harmless.
You’d be surprised, FBI contacted me over the Laser Gun I had featured on Hackaday.
Ahh don’t worry about it, if they rely on Google for their information, the NSA think I’m a 34 year old penguin from Idaho.
Wait… Have you stolen my identity?
why should they “rely” on google when they can just submit a request to your isp?
Why should they submit a request when they have a key to the backdoor?
The author of this article nor creator of the “Tor Dongle” really get security and the advantage of these routers. Don`t follow their advice / claims … Don`t be stupid.
The Tor Dongle only acts as a proxy that could just as well have been installed on the host system. The Browser has to be configured to use that proxy, but this can easyly be bypassed, because all other traffic (flash, DNS,…) is mostlikely unencrypted. You are not anonymous at all with this…
Tor routers are especially save because ALL traffic is routed through them by default.
You can not bypass this by trying to force the client to use unencrypted connections, since the client cannot connect to the web through any other means than the router.
it still won’t prevent browser to leak all kind of private informations at the exit node..
Yep but that’s a your-end problem. You’re volunteering all that crap. There’s a few plugins for Firefox that let you control some of the meta stuff you send.
Gl.Inet released a nice router with 64Mb of ram… and that’s not all:
there’s some GPIO broke out, a serial port, you can even order it without the plastic enclosure for 25$ on DX…
and even better:
they have nice website with informations, the even directly give you a portal image to upload on your router for all your tor need, it beat that hands on…
this website really need an edit button…
here is gl.inet website blog with their portal image to download, they also added information to build it yourself
Is he using the BB as a USB dongle? What else can be done with the BB as a dongle?
blink an led.
Everything. The BBB default install sets that port up as a USB multifunction gadget. It shows up on the host as CDC serial, mass storage, and RNDIS network adapter.
Reblogged this on Beagle Blogger.
Please be kind and respectful to help make the comments section excellent. (Comment Policy)