What’s it all about?

Tor is overcoming censorship, is enabling anonymous data traffic and is providing encryption between a client and an exit node. A common way to the Tor network is to use the Tor Browser with which it is possible to surf in the web or to access hidden services (.onion – Websites). However, there are also other programs using Tor, like the Tor Messenger and TorBirdy (an extension for ‚ÄčMozilla Thunderbird). Though wouldn’t it convenient to route all your data through the Tor network, independently from the client, the service and the program be used?

Three different models (all without https): left - ordinary access on data in the internet; middle - access websites with the Tor Browser; right - accessing data with a TorBox.
Three different models (all without https): left – ordinary access on data in the internet; middle – access websites with the Tor Browser; right – accessing data with a TorBox.
This is what TorBox tries to accomplish, based on a low-priced Raspberry Pi. It creates an own wireless network, with which other devices can connect. All data to this wireless network will be routed through Tor, independently if you use a desktop, laptop, tablet, smartphone or any other device. TorBox can be connected to a internet router through cable, but it can also uses the wireless network of an Access Point (AP), even if the internet provider has set up a captive portal.

A word of warning!

TorBox is in a pre-Alpha stage — it is a hobby-hack, a proof of concept … not more and not less! Use it at your own risk! It is strongly advised not to use TorBox, if your well-being depends from your anonymity. Anonymity is hard to get – solely using Tor will not guarantee it. Malware, Cookies, Java, Flash, Javaskript and more will most certainly compromise your anonymity. Even the people from the Tor Project themselves state that “Tor can’t solve all anonymity problems. It focuses only on protecting the transport of data.” In a high high-risk cases using the Tor Browser only or better Tails is highly recommended (read here, here and here why).

Where to go from here?

If you would like to try TorBox, then you can download from here an image-file (Raspbian based on Debian 9 “Stretch” with Linux Kernel 4.9.59 and Tor 0.2.9.14-1).

You have to write the downloaded image-file on a SD Card, which can be used by your Raspberry Pi (for example with Etcher). Then put the SD Card into your Raspberry Pi and start it up. After about 30 seconds, when the green LED stops to flicker, try to connect the new wireless network “TorBox022”. Connect with your SSH client to 192.168.42.1 (username: pi / password: CHANGE-IT). Now, you should see the TorBox menu. Change the default passwords a soon as possible (you will find the according entries in the advanced menu).

We recommend to use a Raspberry Pi 3 (Model B or Model B+), because it is the most powerful version of the Raspberry Pi familly so far and it comes with its own wireless network / Bluetooth chip.

But I want to build it from scratch!

Wether you like to implement it to an existing system, to another hardware, respectively another operating system or you simply don’t trust an image file, which you didn’t bundle of your own, our detailed manual will help you to build it from scratch.

I want to help…

GREAT! There is a lot to improve and to fix (security of the entire system, a graphical menu, a cool logo …). We are searching people who want to help. The best way is to contact me.