Free US Shipping on orders over $150 with discount code "FREESHIP" at checkout

Tor Anonymous Internet

June 27, 2013

We just started selling our Raspberry Pi basedTor Internet Anonymizer, and we are pretty excited about it.  This is a portable low-power WiFi router that uses Tor technology to make it very difficult for prying companies, ISP's, and other organizations to see what you are doing on the web.  Here is a litte more about Tor, and you can learn a lot more arewww.torproject.org.

 

Tor is an onion routing service - every internet packet goes through 3 layers of relays before going to your destination. This makes it much harder for the server you are accessing (or anyone snooping on your Internet use) to figure out who you are and where you are coming from. It is an excellent way to allow people who are blocked from accessing websites to get around those restritions.

According to the Tor website:

Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they're in a foreign country, without notifying everybody nearby that they're working with that organization.

Groups such as Indymedia recommend Tor for safeguarding their members' online privacy and security. Activist groups like the Electronic Frontier Foundation (EFF) recommend Tor as a mechanism for maintaining civil liberties online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement patterns from eavesdroppers. They also use it to replace traditional VPNs, which reveal the exact amount and timing of communication. Which locations have employees working late? Which locations have employees consulting job-hunting websites? Which research divisions are communicating with the company's patent lawyers? 

A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.



Leave a comment

Comments will be approved before showing up.


Also in News

Ways To Use Raspberry Pi in the Classroom
Ways To Use Raspberry Pi in the Classroom

September 21, 2020

Raspberry Pi computers are useful for teaching students about computers and electronics. Discover ways to use Raspberry Pi in the classroom here.

Continue Reading

How a Micro:Bit Works: Getting Started
How a Micro:Bit Works: Getting Started

September 02, 2020

A Micro:Bit is a small computer board that you can code and connect to other parts to create electronics. Here are the basics of how a Micro:Bit works.

Continue Reading

How To Build a Robot Using Raspberry Pi
How To Build a Robot Using Raspberry Pi

August 28, 2020

Many people would like to make robots but don’t know where to start. In this guide, we go over how to build a robot using a Raspberry Pi so you can get started.

Continue Reading