Any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. Cyber Security Associates Limited, will not be held responsible for any criminal charges brought against any individuals misusing the information in these projects to break the law.
Please ensure you are using the latest SD Card image which is available here.
Understand the basic principles of TOR;
Learn about the security benefits of using TOR;
Configure the Raspberry Pi to be able to proxy traffic through the TOR network.
Component Number (Peli Case)
(Base) 4 + 5
(Level 1) 3
(Level 1) 3
(Level 1) 5
(Level 1) 1
Component Number (Box Case)
Raspberry Pi + Case
Raspbian SD Card
Power Supply Unit
There are many reasons to use TOR, including personal privacy and being able to use the “deep web”. Google has indexed over 200 terabytes of data that makes up the internet that can be accessed using HTTP traffic. This currently only accounts for 0.004% of the total internet which is made up of thousand’s of servers connecting organisations and individuals across the planet. To understand how these protocols and systems can interact with each other we need to be aware of the many different protocols, like TOR, that are available. Just like going on the internet every day, we need to be cautious but accessing services like TOR are no different than accessing your “normal” internet. This project can easily be developed by making the Raspberry Pi an access point for other devices so their traffic is also using the TOR network. It is important to use strong passwords and if you are planning on accessing TOR websites make sure you are connecting to a .onion website, using common .html etc will still be tracked and by still expose data about you.