NSA

Registered Dec18
Last Visited Dec18
Total Posts 46


Posts by NSA


Tutorial: RaspPI Tor Wifi Access Point Without Logging

by NSA in General Questions

...
  NSA   Dec18

By making these changes to the system you can turn your Raspberry PI into a transparent Tor hotspot.
When someone connects to the PI and starts their browser it will redirect them to a landing page where they have to agree to the terms of service.
After they agreed it will route all their tr ...

View Topic (10 replies)



Tutorial: RaspPI Tor Wifi Access Point Without Logging

by NSA in General Questions

...
  NSA   Dec18

7. Using the system
The installation is now complete. Reboot the Raspberry PI by entering "sudo reboot" and boot your laptop.
Connect the laptop to the right access point ("NSA_GCHQ" if you didn't change the name) and enter the access point password ("snowden" i ...

View Topic (10 replies)



Tutorial: RaspPI Tor Wifi Access Point Without Logging

by NSA in General Questions

...
  NSA   Dec18

6. Firewall
The system should by quite secure, but it doesn't hurt to add some extra security with an iptables firewall.
It will prevent all unnecessary incoming connections from all network interfaces and makes sure it would take a very long time to successfully brute force the SSH server.< ...

View Topic (10 replies)



Tutorial: RaspPI Tor Wifi Access Point Without Logging

by NSA in General Questions

...
  NSA   Dec18

5. Prevent logging to SD card
To increase the lifetime of the SD card and to not disclose informations about which MAC addresses connected to the Raspberry PI logging has to be diverted to the ram disk.
After rebooting the Raspberry PI no informations of previous connections will be left. Si ...

View Topic (10 replies)



Tutorial: RaspPI Tor Wifi Access Point Without Logging

by NSA in General Questions

...
  NSA   Dec18

4.5. DHCP server and access point
To automatically assign IP addresses to wireless computers connecting to the Raspberry PI access point it is necessary to install a DHCP server.
At the command prompt enter
sudo apt-get install hostapd isc-dhcp-server -y
4.5.1 DHCP server
Edit th ...

View Topic (10 replies)



Tutorial: RaspPI Tor Wifi Access Point Without Logging

by NSA in General Questions

...
  NSA   Dec18

4. Installing and updating packages
4.1. Changing/adding package sources
When you're at the command prompt again enter
sudo nano /etc/apt/sources.list
Look at the line
deb http://mirrordirector.raspbian.org/raspbian/ wheezy main contrib non-free rpi
"wheezy" is the current de ...

View Topic (10 replies)



Tutorial: RaspPI Tor Wifi Access Point Without Logging

by NSA in General Questions

...
  NSA   Dec18

1. Download files
Download the latest version of win32diskimager:
http://sourceforge.net/projects/win32di ... t/download
If you don't use Windows you need to Google how to write the .img file to the SD card.
Download the latest version of Raspbian:
http://downloads.raspberrypi.or ...

View Topic (10 replies)



Tutorial: RaspPI Tor Wifi Access Point Without Logging

by NSA in General Questions

  NSA   Dec18

This step-by-step tutorial explains how to install Raspbian with Tor on a Raspberry PI remotely (without connecting a keyboard/monitor to the Raspberry PI).
It is based on the Onion PI tutorial from Adafruit but has many changes and additions. Every step needed to make it work is mentioned in th ...

View Topic (10 replies)



How to block all traffic exept Tor

by TOR Hacker in Userspace Software

...
  NSA   Dec18

Yes, you forgot "xhost +" before sudoing. Xhost + changes the access controls of the xserver so programs started by other users can be displayed on it.

View Topic (24 replies)



How to block all traffic exept Tor

by TOR Hacker in Userspace Software

...
  NSA   Dec18

The xhost response is not an error message. It works fine. The line in /etc/apt/apt.conf.d/00aptitude does not do anything to Tor browser. It only applies to Ubuntu updates.
You can still make apt-get work through the Tor socks proxy btw. (after starting Tor of course). You'd just need to add th ...

View Topic (24 replies)



How to block all traffic exept Tor

by TOR Hacker in Userspace Software

...
  NSA   Dec18

Ah you mean you changed the HTTP proxy settings in Tor Browser and now it won't connect? Just remove the proxy settings again.

View Topic (24 replies)



How to block all traffic exept Tor

by TOR Hacker in Userspace Software

...
  NSA   Dec18

You can easily add normal Tor bridges to the Tor config file, because it's easy to get a list. But it's not easy to get a list of obfs bridges, because there is no public list.
Which lines do you mean? The ones which TOR Hacker posted? Just replace the username "toranon" with username "ofrester" ...

View Topic (24 replies)



How to block all traffic exept Tor

by TOR Hacker in Userspace Software

...
  NSA   Dec18

Ah right. It tries to get the hostname of the repository server through the internet. If DNS resolving is blocked by your provider then that won't work.
Can you connect to this website? http://packages.ubuntu.com/
Btw you were talking about obfsproxy. Do you use the Pluggable Transports ver ...

View Topic (24 replies)



How to block all traffic exept Tor

by TOR Hacker in Userspace Software

...
  NSA   Dec18

Add this line to /etc/apt/apt.conf.d/00aptitude
Acquire::socks::Proxy "socks://127.0.0.1:9050";
Then apt-get will use Tor for downloading.

View Topic (24 replies)



How to show country/flag in Tor network map?

by pstein in General Questions

...
  NSA   Dec18

You could search for their names on
http://torstatus.blutmagie.de or https://atlas.torproject.org/

View Topic (3 replies)



How to block all traffic exept Tor

by TOR Hacker in Userspace Software

...
  NSA   Dec18

When you use Vidalia to start Tor then there is no easy way to do this. You would have to allow every entry node/bridge seperately to block everything but Tor.
You may want to install the Tor package instead:
https://www.torproject.org/docs/debian#development
Also install Privoxy:
ap ...

View Topic (24 replies)



Difference ExitNodes, StrictNodes, StrictExitNodes?

by pstein in General Questions

...
  NSA   Dec18

ExitNodes 1 is not a valid configuration entry. Instead you use either country codes, fingerprints, names or IP addresses of exist nodes.
StrictNodes 1 will force Tor to use the nodes in ExitNodes even when it breaks things (exit node is offline).

View Topic (3 replies)



Show and change current Tor network connection node chain?

by pstein in General Questions

...
  NSA   Dec18

It's just information. You can create new circuits by getting a new identity.

View Topic (2 replies)



100% anonymity with TOR. Is this possible?

by TOR Hacker in Security Questions

...
  NSA   Dec18

When your adversary is monitoring both the route between your computer and the entry node, and the route between the exit node and the website you visit, then they can do a traffic correlation leading to de-anonymization. You could use a VPN in a country which is not monitored by your adversary and ...

View Topic (2 replies)