Datasheet

Groups such as Indymedia recommend Tor for safeguarding their members' online privacy and security. Activist
groups like the Electronic Frontier Foundation (EFF) recommend Tor as a mechanism for maintaining civil liberties
online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement
patterns from eavesdroppers. They also use it to replace traditional VPNs, which reveal the exact amount and
timing of communication. Which locations have employees working late? Which locations have employees
consulting job-hunting websites? Which research divisions are communicating with the company's patent
lawyers?
A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while
deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without
leaving government IP addresses in their web logs, and for security during sting operations.
BEFORE YOU START USING YOUR PROXY - remember that there are a lot of ways to identify you, even if
your IP address is 'randomized'. Delete & block your browser cache, history and cookies - some browsers
allow "anonymous sessions". Do not log into existing accounts with personally identifying information (unless
you're sure that's what you want to do). Use SSL whenever available to end-to-end encrypt your
communication. And read https://www.torproject.org/ for a lot more information on how to use Tor in a smart
and safe way
This tutorial is a great way to make something fun and useful with your Raspberry Pi, but it is a work in
progress. We can't guarantee that it is 100% anonymous and secure! Be smart & paranoid about your Tor
usage.
© Adafruit Industries https://learn.adafruit.com/onion-pi Page 4 of 16