By making these changes to the system you can turn your Raspberry PI into a transparent Tor hotspot.
When someone connects to the PI and starts their browser it will redirect them to a landing page where they have to agree to the terms of service.
After they agreed it will route all their tr
7. Using the system
The installation is now complete. Reboot the Raspberry PI by entering "sudo reboot" and boot your laptop.
Connect the laptop to the right access point ("NSA_GCHQ" if you didn't change the name) and enter the access point password ("snowden" i
The system should by quite secure, but it doesn't hurt to add some extra security with an iptables firewall.
It will prevent all unnecessary incoming connections from all network interfaces and makes sure it would take a very long time to successfully brute force the SSH server.<
5. Prevent logging to SD card
To increase the lifetime of the SD card and to not disclose informations about which MAC addresses connected to the Raspberry PI logging has to be diverted to the ram disk.
After rebooting the Raspberry PI no informations of previous connections will be left. Si
4.5. DHCP server and access point
To automatically assign IP addresses to wireless computers connecting to the Raspberry PI access point it is necessary to install a DHCP server.
At the command prompt enter
sudo apt-get install hostapd isc-dhcp-server -y
4.5.1 DHCP server
4. Installing and updating packages
4.1. Changing/adding package sources
When you're at the command prompt again enter
sudo nano /etc/apt/sources.list
Look at the line
deb http://mirrordirector.raspbian.org/raspbian/ wheezy main contrib non-free rpi
"wheezy" is the current de
1. Download files
Download the latest version of win32diskimager:
http://sourceforge.net/projects/win32di ... t/download
If you don't use Windows you need to Google how to write the .img file to the SD card.
Download the latest version of Raspbian:
This step-by-step tutorial explains how to install Raspbian with Tor on a Raspberry PI remotely (without connecting a keyboard/monitor to the Raspberry PI).
It is based on the Onion PI tutorial from Adafruit but has many changes and additions. Every step needed to make it work is mentioned in th
The xhost response is not an error message. It works fine. The line in /etc/apt/apt.conf.d/00aptitude does not do anything to Tor browser. It only applies to Ubuntu updates.
You can still make apt-get work through the Tor socks proxy btw. (after starting Tor of course). You'd just need to add th
You can easily add normal Tor bridges to the Tor config file, because it's easy to get a list. But it's not easy to get a list of obfs bridges, because there is no public list.
Which lines do you mean? The ones which TOR Hacker posted? Just replace the username "toranon" with username "ofrester"
Ah right. It tries to get the hostname of the repository server through the internet. If DNS resolving is blocked by your provider then that won't work.
Can you connect to this website? http://packages.ubuntu.com/
Btw you were talking about obfsproxy. Do you use the Pluggable Transports ver
When you use Vidalia to start Tor then there is no easy way to do this. You would have to allow every entry node/bridge seperately to block everything but Tor.
You may want to install the Tor package instead:
Also install Privoxy:
ExitNodes 1 is not a valid configuration entry. Instead you use either country codes, fingerprints, names or IP addresses of exist nodes.
StrictNodes 1 will force Tor to use the nodes in ExitNodes even when it breaks things (exit node is offline).
It's just information. You can create new circuits by getting a new identity.
When your adversary is monitoring both the route between your computer and the entry node, and the route between the exit node and the website you visit, then they can do a traffic correlation leading to de-anonymization. You could use a VPN in a country which is not monitored by your adversary and