The oRouter Is A Tor-Powered Linux Box That Secures Your Internet Connection

This could really change everything....

Longtime TechCrunch Disrupt NY hackathon participants, Kay Anar and Gilad Shai showed off their hardware hack today called the "oRouter" - a Linux-powered, Raspberry Pi-like computer offering secure Wi-Fi access via the Tor network. The idea is to offer an affordable alternative to downloading the Tor software to your computer, as well as a way to more easily connect to Tor over mobile devices like an iPhone.

Kay says the idea for the project actually came to him via a non-technical friend, who had asked him if there was something she could just plug into the back of her computer in order to secure her connection from snooping. An answer wasn't readily available.

The oRouter uses off-the-shelf components purchased at Radio Shack, including a low-power single board computer from Texas Instruments, and low-power USB Wi-Fi dongles. The device only requires 5 volts of power to run, which allows it to pull juice from something as simple as a portable charger, for example. The version of the oRouter demoed at the Hackathon today supports up to 32 simultaneous connections.

As an end user, the process of using the oRouter is designed to be exceedingly simple. It's zero configuration, meaning that you plug it in and then connect to the Wi-Fi network it provides. Unlike the Tor download, it requires no additional software in order to work. Once connected, as you browse the web and use online services, you're actually using Tor (via Wi-Fi), thereby securing your communications from eavesdropping. In addition, for an extra layer of security, the oRouter's MAC address (hardware address) changes every 10 minutes.

In the future, more advanced configurations may be made available for technical users, which would allow them to tweak the settings for their own needs.

While originally intended to just be a hack, the two teammates are now considering taking the project further, possibly raising funds via investors or crowdfunding, in order to put the oRouter in production and start selling.

http://techcrunch.com/2014/05/04/the-orouter-is-a-tor-powered-linux-box-that-secures-your-internet-connection/?utm_campaign=fb&ncid=fb


Comments


[3 Points] NiggaKingKilla:

Sounds promising, but wouldn't always browsing through Tor cause some complications? Some websites won't even let me access all their features with Tor.


[2 Points] al_eberia:

It's been done before:

https://github.com/grugq/PORTALofPi

https://learn.adafruit.com/onion-pi/overview

TAILS is still better for darknet use as if you are using a normal operating system and this setup to connect you will be leaving logs/traces on the hard-drive.


[2 Points] galaxyandspace:

iPhone, and many other devices, are still inherently insecure. Sure, all your info is still going through the Tor connection. But this does not guarantee end to end encryption is being used, nor does it mean your computer can't be hacked. You data stored on your drives is still open to be viewed by anyone capable.

This is not a silver bullet. But it is kinda cool.


[2 Points] c0derx:

The 'answer' is really meshnets, but they're not widespread enough to really be viable.

When you are using an ISP to connect then all the information is right there, TOR / VPN / proxy, whatever, your ISP can see them all and if they care to, can break your security measures quite easily.


[1 Points] None:

Careful making a dongles joke guys, a feminist might be around!!1


[1 Points] limitz:

As another has mentioned. It's has been done before, but here's yet another implementation:

https://learn.adafruit.com/onion-pi/overview

Which is exactly what they did. Ethernet connected to Pi, and the Pi broadcasts an encrypted wifi connection.

Not really a business model if it's been done numerous times for free.


[1 Points] Homer_Goes_Crazy:

Would doing it this way decrease the latency any?


[1 Points] blackkklabel:

Why not just spend $30 bucks and make a Raspberry-Pi Tor Proxy? It's just another BSSID you connect to, so you could use your iPhone, even though, I'm not too sure how secure that really would be considering Apple doesn't play well with others, if you know what I mean. It's easy if you actually understand what your doing instead of trying to figure out the instructions. I'm looking at you high school kids) and fun building it!! If you dont think you could build one of these, then you dont belong on the dnm's.


[1 Points] tgif3:

One word SafePlug

https://pogoplug.com/safeplug