Onion Pi, a Raspberry Pi for security

Onion pi

We have been telling you about 5 projects for our house in which we used Free Hardware and Raspberry Pi for a long time. On this article We were talking about using Raspberry Pi and the TOR project. A home project that is having its success and that other websites decided long ago to start it.

Adafruit, one of the most famous brands within Free Hardware has created a guide to build a project almost the same. This project has received the name of Onion Pi.

The name of Onion Pi comes from the combination of Raspberry Pi plus the Tor network symbol, the onion. The Red Tor uses a system of security layers that work like the layers of the onion. This system is effective and safe for those who navigate through this system. So much so that users who enter this system are undetectable by many viruses, scanners, etc ...

Onion Pi helps us navigate anonymously using a Raspberry Pi

Thanks to the Onion Pi project we can have this security system for very little money: we will only need Raspberry Pi and a wireless router. This router is important because We need Raspberry Pi to be connected by cable and by Wifi to offer security to all devices in the home or company. What makes us need Raspberry Pi 3. Once we have connected everything to the Raspberry Pi, we have to download the TOR program on Raspbian and modify some parameters of the program to suit our home or business network.

Onion Pi cannot yet be a unique and independent gadget such as a mediacenter or a smart speaker, but thanks to the Adafruit guide already Raspberry Pi, it is not necessary to buy it since we can build it for very little money.


The content of the article adheres to our principles of editorial ethics. To report an error click here!.

2 comments, leave yours

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.

  1.   Salvador said

    Your articles and adaptations with the Lion 2 projects are very good for me. It goes wonderful, especially with one of these raspberries.

  2.   osanchez said

    Hello, what a good article and very interesting above all. My question is: is there a tutorial where they teach how to build and program this device?