What’s it all about?

TorBox is an easy to use, anonymizing router based on Raspberry Pi. TorBox creates a separate WiFi that routes the encrypted network data over the Tor network. The type of client (desktop, laptop, tablet, mobile, etc.) and operating system on the client don’t matter.

Tor, on which TorBox is based, encrypts your network data from your client to the Tor exit node, overcomes censorship and anonymizes. Commonly, Tor is used by the Tor Browser, which facilitates surfing the web or accessing hidden services (.onion – Websites). However, there are also other programs using Tor, like the Tor Messenger and TorBirdy (an extension for ​Mozilla Thunderbird). Though wouldn’t it convenient to route all your data through the Tor network, independently from the client, the service and the program be used?

Three different models (all without https): left - regular access on data on the internet; middle - access websites with the Tor Browser; right - accessing data with a TorBox.
Three different models (all without https): left – regular access on data on the internet; middle – access websites with the Tor Browser; right – accessing data with a TorBox.
This is what TorBox accomplishes by creating a separate WiFi and routing all network data over the Tor network. The TorBox image file, available here (900 Mb), can be run on a low-priced Raspberry Pi.

TorBox can be connected to an internet router through cable, but it can also be used in connection with another (unsecured) Wifi, even if it has a captive portal.

A word of warning!

TorBox is in an “alpha test phase”. Use it at your own risk!

TorBox is ideal for providing additional protection for the entire data stream up to the Tor network and for overcoming censorship. However, anonymity is hard to get – solely using Tor doesn’t guarantee it. Malware, Cookies, Java, Flash, Javascript and more will most certainly compromise your anonymity. Even the people from the Tor Project themselves state that “Tor can’t solve all anonymity problems. It focuses only on protecting the transport of data.” Therefore, it is strongly advised not to use TorBox, if your well-being depends on your anonymity. In such a situation it is advisable to use Tails (read here, here and here why).

Where to go from here?

  1. Download the latest Torbox image file (TorBox v.0.2.3 on Raspbian based on Debian 9 “Stretch” with Linux Kernel 4.14.79 and Tor; 900 Mb).
  2. Transfer the downloaded image file on an SD Card; for example with Etcher. TorBox needs at least a 4 Gbyte SD Card, but 8 Gbyte is recommended.
  3. Put the SD Card into your Raspberry Pi, link it with an Internet router using an Ethernet cable or place a USB WiFi adapter in one of the USB ports to use an already existing WiFi. Afterward, start the Raspberry Pi. During the start, the system on the SD card automatically expands over the entire free partition – user interaction, screen, and peripherals are not required.
  4. After 2-3 minutes, when the green LED stops to flicker, connect your client to the new WiFi “TorBox023”. Then use an SSH-client to access (username: pi / password: CHANGE-IT). Now, you should see the TorBox menu. Choose the preferred connection setup and change the default passwords as soon as possible (the associated entries are placed in the advanced menu).

Raspberry Pi 3 (Model B or better a Model B+) is recommended because it is the most powerful version of the Raspberry Pi family and comes with an integrated WiFi chip.

I want to build it from scratch!

Whether you like to implement it to an existing system, to another hardware, respectively another operating system or you don’t trust an image file, which you didn’t bundle of your own, our detailed manual helps you to build a TorBox from scratch.

I want to help…

GREAT! There is a lot to improve and to fix (security of the entire system, graphical menu, cool logos …). We are searching for people, who want to help and we need especially your feedback to improve the system. The best way is to contact me.