

The second interface will connect to an Untrusted network. The topology ( figure 1 ) is pretty simple : One interface of the Raspberry Pi will provide a secure trusted network and appear as a standard router. I’m going to show you how to build a Transparent Tor Proxy to protect your devices without needing to install or configure software on the end devices. There is a solution and all you need is a Raspberry Pi to solve all of those problems. Now, you can install the native Tor client on your machine to fix that, but what if you forget to launch the client? What if you have a hardware device like a VoIP phone, or even an Xbox that just does not support Tor? What about those operating system updates that run in the background ? They are not going to use Tor. Do you use a different browser? A custom email client? What about that chat application you use? Or synchronized file storage like Dropbox or OneDrive? None of that is protected by the Tor Browser. For example, it does not provide security for any other applications on your system. However, the Tor Browser has some limitations.

Installation is simple, the browser automatically connects to the Tor network, and you are surfing anonymously within minutes. The simplest way to make use of Tor is by installing their custom web browser, the Tor Browser.

Tor provides a network stack that anonymizes users while accessing the Internet. One project that has sought to fix that is The Onion Router, more commonly known as the Tor Project. Many people have begun to recognize how little privacy is actually available when accessing networks like the Internet.
