Tor (short for The Onion Router) is a system intended to enable online anonymity. The Tor client software directs internet traffic through a worldwide volunteer network of servers to conceal a user's location or usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult to trace Internet activity, including "visits to Web sites, online posts, instant messages and other communication forms", back to the user and is intended to protect users' personal freedom, privacy, and ability to conduct confidential business by keeping their internet activities from being monitored.

So obviously, TOR needs a large amount of servers and as TOR network is not a commercial organisation, it requires voluntary supporters. You can be one of them and turn your Raspberry in a TOR relay.

Step 1: Parts needed

You need the following parts:

- Raspberry Pi
- power supply
- network cable/connection to the Internet
- SDcard with Raspbian (you can find all necessary installation intructions here: http://www.raspbian.org/RaspbianInstaller)

<p>nice tutorial - but I'm now having trouble accessing my nas</p><p>Have I screwed up something? </p><p>Please advise </p>
<p>Open a terminal</p><p><em>apt-get install sudo<br><br>first line commant and it says <br><br></em>E: Could not open lock file /var/lib/dpkg/lock - open (13: Permission denied)</p><p>E: Unable to lock the administration directory (/var/lib/dpkg/), are you root?</p>
<p>Type: &quot;sudo su&quot; without the &quot;&quot;. then try it again.</p>
<p>made it an on request only socks port entity, using privoxy for sockks5 communication from all windows systems.</p><p>Super Instructable, Thank you</p><p>Works like a charm</p>
<p>Done, this instructable is a bit outdated though, for people looking for more info follow this</p><p><a href="http://www.devconsole.info/?p=879" rel="nofollow">http://www.devconsole.info/?p=879</a></p><p>Alot more info.</p>
<p>So I've got this message:</p><p><em>Tor has successfully opened a circuit. Looks like client functionality is working.</em></p><p>But when I go to globe.torproject.org and see if my nickname shows, but it doesn't. I waited well over an hour to make sure everything was updated. </p><p>How can I locally confirm that the relay is working?</p><p>Thank you!</p>
<p>You have already finished Tor Relay For Raspian on step 6. A man without any knowledge of tor won't make this instructable. Step 7: Configuring your browser to use Tor is not necessary at all. Just like an advertisement.</p><p>But good instructable, thank you!</p>
I've got a quick question for anyone here who is more conversant with the Tor algorithm. And please point me to resources if there's a project like I describe already in motion somewhere else!<br> <br> How well will a relay - of any type - function with an intermittent connection?<br> <br> The scenario I'm imagining is a Tor relay mounted on a vehicle (car or bike) using a wireless connection. If one travels routinely through a crowded wifi environment in stop-and-go conditions, would such a relay be able to negotiate a connection and spend a useful amount of time serving as a relay? Such as while stopped at a light or crawling along in congestion? Or while your bike is parked outside a place with an open network.<br> <br> I understand some of this might violate TOS for some networks, but be assured, this is just a thought experiment. I have too many other hobbies right now.
<p>I am trying to do something like this for a distributed process grid ... </p>
<p>Too bad tor its not working anymore...the tor package for Raspberry pi shows 404. I tried a lot.</p>
<p>Nice tutorial - I'd never heard of Tor until tonight when a mate posted on FB about it. Now configured and running. Thanks</p>
<p>Sweet, works smoothly :)</p>
Alternative tutorial in http://unsuspectingbit.com/tutorial-private-anonymizing-proxy-raspberry-pi-tor-based/
Its excellent :)
You forgot <br>Then add this line to your /etc/apt/sources.list file: <br>deb http://deb.torproject.org/torproject.org wheezy main <br> <br>Then add the gpg key used to sign the packages by running the following commands at your command prompt: <br> <br>gpg --keyserver keys.gnupg.net --recv 886DDD89 <br>gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add - <br>Now refresh your sources, running the following command (as root) at your command prompt: <br>apt-get update <br>If there are no errors you're good to continue. <br>We provide a Debian package to help you keep our signing key current. It is recommended you use it. Install it using <br> <br>apt-get install deb.torproject.org-keyring <br>To finally install Tor just run: <br> <br>apt-get install tor
tor rocks
Hi there, thx for the nice how to. <br>i've got two question about the follwing part: <br>&quot;Add the line <br> <br> tor ALL=(ALL) ALL&quot; <br> <br>i quess this is for the rights the tor user will get. is it ok to give him all? oder am i on the wrong way. i just wanted to know if this influences my normal pi user. <br> <br>and there ist also the second question if i could run this tor -relay while im logged on with the pi user but start it in terminal with the tor user. or is this a stupid idea? <br> <br>thx a lot
nice description of tor, how widely is tor being used, how much data passes through any given tor node per day? per hour?
Nice and straight forward. <br>Perhaps you could add a brief step at the end on how to use TOR?
Thank you! I've added a step at the end with information how the client works and how to install it.

About This Instructable


214 favorites


Bio: I love to hack things or make new ones.
More by fNX: Learning Arduino basics the easy way - Part 01 "Blink" or "The Internet" Raspberry Pi Firewall and Intrusion Detection System Raspberry Pi Tor relay
Add instructable to: