Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

TorBox #44

Open
dwblair opened this issue Oct 30, 2012 · 0 comments
Open

TorBox #44

dwblair opened this issue Oct 30, 2012 · 0 comments

Comments

@dwblair
Copy link
Member

dwblair commented Oct 30, 2012

Summary

Using a cheap, easily configured computer like the Raspberry Pi, a custom enclosure and an online community with legal savvy, one will be able to donate bandwidth to the TOR network quickly, easily and safely, thus helping users throughout the world browse the internet with anonymity.

Intended audience

Public libraries, who already offer anonymous public internet access. This device will just expand the boundaries beyond those who can physically come to the library.

Anyone should be welcome to use the TorBox, but individuals need to be aware of the rules and restrictions of their internet service provider (for example, it is against Comcast's terms of service to run a Tor node). The documentation for setup will be primarily oriented for institutions like libraries, rather than private citizens.

System design

Starting with this Instructables project, and adding a custom enclosure like this one (only with the TOR logo or something similar), a plug-and-play device can be developed, requiring minimum configuration. The user just plugs it in, runs through a simple online configuration wizard (to set network configurations, and decide whether to be an exit node)

Distribution

The device shall be sold online for cost. Sale of the preconstructed device is solely for the convenience of the end user, not to earn profit. All blueprints and instructions shall be released under open licensure, so anyone can build or modify this on their own.

Community and legal protection

Much like Bittorrent and other technologies, TOR can be used by people to do bad things, too. Being an exit node for traffic will make your IP appear to be doing these bad things, and could bring the police to your door. To mitigate this risk, there should be an online community associated with this device where exit node users can register, documenting their IP address and the time they choose to become an exit node. This information will live somewhere legally recognizable, and have the necessary associated paperwork to act as proof that the user is not responsible for the traffic coming from the IP. This is going to be the hardest part of the project.

Consultation with lawyers will be necessary, and there will need to be sufficient technology in place to reliably check that the IP address in question is being used as an exit node at any timeframe in question.

Documentation

There will need to be very clear documentation for all stages of set up and registration, so that anyone can feel comfortable starting with the TorBox. There will also need to be a communications mechanism that is easy and responsive, so folks can ask questions and get person-to-person help (email is probably the best here, though a forum or bug tracker may also work).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant