![]() ![]() What do you think.? Has anyone tried doing this.? How did it work out. This means that you’re not restricted to using it in one place you can set it up in front of the router (it behaves as a WiFi hotspot) in the office you’re working from, in your hotel room or at your Mum’s. I would use Qubes for the Tor box and the other box, if only for the VT-D protection, although maybe there are other free Linux OSs that have VT-D protection. You can, of course, run a Tor proxy on any machine, but the particularly nice thing about Adafruit’s Onion Pi is its portability. And as far as we know, there are no exploits for the Tor network itself, only for Firefox. If you were hacked in Qubes, the hacker could easily then leak out your real IP address.īut if you were hacked behind a physical Tor box, your real IP can never leak, unless the Tor box itself can be compromised. However, the problem with Qubes, of course, is all the Xen exploits which make it insecure. Qubes implements this somewhat by separating the Whonix Net VM and App VM. So long as the other computer connects to the Tor computer for network access, it doesn't matter if it gets hacked, because your real IP address never leaks. Another computer runs Firefox and any other programs. So start by connecting your Raspberry Pi to your box via Ethernet (if you use a Wi-Fi dongle, also connect it to your Raspberry Pi), turn it on, connect to it and open the terminal. Therefore, you have 1 computer that runs Tor only, and a WiFi hotspot. ![]() The theory is, Tor is secure, but Firefox is not. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |