Tor browsing via Raspberry Pi

I recently explored setting up an OnionPi to be a dedicated device for browsing .onion sites and obfuscating the source IP address. Just to say it, you don’t have to be doing ‘criminal’ stuff to be using tor. I just wanted to get that out there and encourage more people to explore the ‘darknet’ / ‘deepweb’ / etc. I followed an Adafruit guide on setting up my OnionPi. I will describe more about the device, how it functions and some extra feedback, relating to the guide on installation.

Presuming you have a Raspberry Pi and supported Wireless adapter, you will be plugging in a wired internet cable to your Pi, that will share the onion-routed internet connection over wireless. Once you complete the configuration and install steps, your Pi will be ready to route your wireless traffic over TOR.
If you are more curious about tor and what it is about, checkout https://torproject.org/.

The guide I worked from is this link on AdaFruit. The kicker here, is that you really need your Wireless setup for the Tor install process to work and for the Tor service to work properly. So really, You want to start with installing WiFi and DHCP support.
Before you start, be sure to set a custom password for root and pi accounts on your Raspbian (or whatever you choose) OS.

I did not run the installation script, since I figured it would be easier to troubleshoot if I manually ran each step / configuration command. Besides I got to learn in the process of manually following along, so win bonus.

Once you setup your WiFi Access Point, go for the Tor install and configuration. Once done, fire up the service and check your internet-facing IP (WhatisMyIP or any similar site will do). You will also know you are on Tor, because CAPTCHA prompts will be more common in your browsing.
A fun little fact I noticed, is to browse .onion pages, you still want to have the Tor Browser installed. Any other browser will still benefit from an obfuscated IP Address, but you will get an error trying to browse to .onion sites.

One of the main benefits of setting up a hardware-based Tor device, is you can connect whatever wireless enabled device you wish to it. There have been many write-ups and conversations about the Tor Browser alone, being vulnerable to leaking data… especially if your connection is not fully-routed through an onion router. Not to say using an onion router is 100% untraceable, but every little bit helps.

Extra notes, that really apply to any web browsing, is to install add-blocking plugins. Advertising has been a known attack vector for years now and it only becomes more common. Visitors to this site may be aware of my lack of love for online advertising. Different strokes for different folks and all of that.

To conclude this post, I also want to mention Tails. This is a USB based operating system that is very handy in browsing tor, especially on the go. If you want to use your own OS and applications on the tor network, that is where the extra work of setting up an OnionPi (Raspberry Pi Device with Tor installed) is helpful to you.
Source: FTB Threads

Tor browsing via Raspberry Pi

I recently explored setting up an OnionPi to be a dedicated device for browsing .onion sites and obfuscating the source IP address. Just to say it, you don’t have to be doing ‘criminal’ stuff to be using tor. I just wanted to get that out there and encourage more people to explore the ‘darknet’ / ‘deepweb’ / etc. I followed an Adafruit guide on setting up my OnionPi. I will describe more about the device, how it functions and some extra feedback, relating to the guide on installation.

Presuming you have a Raspberry Pi and supported Wireless adapter, you will be plugging in a wired internet cable to your Pi, that will share the onion-routed internet connection over wireless. Once you complete the configuration and install steps, your Pi will be ready to route your wireless traffic over TOR.
If you are more curious about tor and what it is about, checkout https://torproject.org/.

The guide I worked from is this link on AdaFruit. The kicker here, is that you really need your Wireless setup for the Tor install process to work and for the Tor service to work properly. So really, You want to start with installing WiFi and DHCP support.
Before you start, be sure to set a custom password for root and pi accounts on your Raspbian (or whatever you choose) OS.

I did not run the installation script, since I figured it would be easier to troubleshoot if I manually ran each step / configuration command. Besides I got to learn in the process of manually following along, so win bonus.

Once you setup your WiFi Access Point, go for the Tor install and configuration. Once done, fire up the service and check your internet-facing IP (WhatisMyIP or any similar site will do). You will also know you are on Tor, because CAPTCHA prompts will be more common in your browsing.
A fun little fact I noticed, is to browse .onion pages, you still want to have the Tor Browser installed. Any other browser will still benefit from an obfuscated IP Address, but you will get an error trying to browse to .onion sites.

One of the main benefits of setting up a hardware-based Tor device, is you can connect whatever wireless enabled device you wish to it. There have been many write-ups and conversations about the Tor Browser alone, being vulnerable to leaking data… especially if your connection is not fully-routed through an onion router. Not to say using an onion router is 100% untraceable, but every little bit helps.

Extra notes, that really apply to any web browsing, is to install add-blocking plugins. Advertising has been a known attack vector for years now and it only becomes more common. Visitors to this site may be aware of my lack of love for online advertising. Different strokes for different folks and all of that.

To conclude this post, I also want to mention Tails. This is a USB based operating system that is very handy in browsing tor, especially on the go. If you want to use your own OS and applications on the tor network, that is where the extra work of setting up an OnionPi (Raspberry Pi Device with Tor installed) is helpful to you.
Source: FTB Threads

Encrypt stuff guide

This thread will be a collection of resources on how to use encryption, tool use suggestions and where possible, usage explanations.

I’m fine with reading technical documents, however I also value time and the ability to convey a point, without a huge time investment. The easier and more clearly encryption can be used, the better everyone will be.
Be it an individual or some sort of state agency / boogeyperson, more layers and protections are a good thing. Having protections does not make one a criminal, either.

CryptSetup LUKS guide. There are command syntax examples and console response dialogs.

Cryptsetup is nice, as it also handles mounting of drives and partitions. If you are unable to mount a drive, you will likely need to install cryptsetup. This should also work to mount any TAILS persistent volumes you have setup.
For more info on DM-Crypt (cryptsetup), the Arch wiki is a great resource.

Samples of flow (1st link)
01 step: install cryptsetup (dm-crypt)
02 step: confirm your drive target and valid partition (gparted or parted to get your /dev/(drive))
03 step: initialize your drive

# cryptsetup -y -v luksFormat /dev/xvdc

(This is setting up your passcode to access drive)
04 step:

# cryptsetup luksOpen /dev/xvdc backup2

(Mounts newly configured drive)
05 step: format the LUKS partiton (needless to say, you really want to have the correct drive or you have lost data on the drive you are using)

# dd if=/dev/zero of=/dev/mapper/backup2

(This will take quite some time. Let the cursor do it’s work, check your hdd led to confirm activity)
Source: FTB Threads

Fallout 4

An 11-10-2015 approaches soon. I have a 24 GB download pre-load that was up for download tonight on Steam.
I also saw some articles noting the PC DVD release also ties into a steam account and as such, downloads the rest of the game while online. So a heads up for any from-disk installers.

I will be playing a controller and PC keyboard variation control scheme. It should be fun to mash on through the wasteland at midnight or potentially before, depending on when the game unlocks to play.
As usual with a pre-load, be sure to have plenty of free space on your hard drive. That 25 GB is going to get extracted on release, so one wants not to have an install free space issue.
If I run into any application based errors, I will share what I find and observe. Hopefully we shall not have any silly issues like that, short of maybe a console command for a bugged quest. Still, I’d share that as well.

Soon :) A full-screen world immersion will occur. There will be much rejoicing.

Live play info:
Still not having bug issues and I have over 10 hours or play on my save. I did have some close calls getting stuck in world map debris. Also had a dialog loop, that eventually timed out after a minute and resumed interactive dialog.
For a config / boast of smooth performance dialog:

  • I am playing @ 1080P with Antialiasing @ TAA
  • Anisotropic Filtering @ 16 samples, on the Ultra preset.

I think the game looks awesome and holds a steady frame rate. I am playing on a Nvidia 980 GTX with an Intel 4690K i5-CPU. Game is also running on a solid state drive.
Source: FTB Threads

Fallout 4

An 11-10-2015 approaches soon. I have a 24 GB download pre-load that was up for download tonight on Steam.
I also saw some articles noting the PC DVD release also ties into a steam account and as such, downloads the rest of the game while online. So a heads up for any from-disk installers.

I will be playing a controller and PC keyboard variation control scheme. It should be fun to mash on through the wasteland at midnight or potentially before, depending on when the game unlocks to play.
As usual with a pre-load, be sure to have plenty of free space on your hard drive. That 25 GB is going to get extracted on release, so one wants not to have an install free space issue.
If I run into any application based errors, I will share what I find and observe. Hopefully we shall not have any silly issues like that, short of maybe a console command for a bugged quest. Still, I’d share that as well.

Soon :) A full-screen world immersion will occur. There will be much rejoicing.

Live play info:
Still not having bug issues and I have over 10 hours or play on my save. I did have some close calls getting stuck in world map debris. Also had a dialog loop, that eventually timed out after a minute and resumed interactive dialog.
For a config / boast of smooth performance dialog:

  • I am playing @ 1080P with Antialiasing @ TAA
  • Anisotropic Filtering @ 16 samples, on the Ultra preset.

I think the game looks awesome and holds a steady frame rate. I am playing on a Nvidia 980 GTX with an Intel 4690K i5-CPU. Game is also running on a solid state drive.
Source: FTB Threads

What's everyone mostly playing anymore?

Title topic.

 

I’ve been playing way to much league of legends, d3, hearthstone and a few other sp games :) Lmk what yall are playing anymore it’d be fun ot see you guys in game sometime.

Source: FTB Threads

What's everyone mostly playing anymore?

Title topic.

 

I’ve been playing way to much league of legends, d3, hearthstone and a few other sp games :) Lmk what yall are playing anymore it’d be fun ot see you guys in game sometime.

Source: FTB Threads