Yesterday I was at the OTI offices again for a workday. For a chunk of the day I worked with Dan Staples on reviewing some things I’d learned about network settings in Commotion, and testing a Tor-enabled Commotion build. (More on that in a separate post.)
A couple of funny things happened on the way to the Internet. First, running Tor on a Ubiquiti PicoStation wireless node caused the little machine to overheat and reboot within 30 seconds of the process starting! Ha! We niced the process and managed to get it to stay up long enough to properly start up. I’ll do some more troubleshooting to figure out why it’s running so hard and see if there’s a way to (literally) cool it down. But I thought that was a pretty awesome problem.Read More
Here’s a cheat sheet that I wrote up for myself about two weeks ago after I’d gotten my bearings with the basics of Tor. I actually wrote it as an informal status update to my mentor and realized that if it was helpful to me, it might be helpful to someone else. If you see any errors, don’t be shy about setting me back on the right path!
First, though, please bask in the glory of this super awesome clickable graphic that demonstrates what network traffic is and isn’t obscured by Tor and HTTPS (encrypted HTTP). This snippet below is just a teaser. Click it to go to a page where you can click buttons for Tor and HTTPS and see how they work.Read More
As I wrote previously, I started a work-from-home internship with the Open Technology Institute last Wednesday. The project I was placed with has me working on boosting privacy and anonymity in wireless mesh networks. I spent some time orienting myself with the task and organizing my thoughts.
Commotion mesh nodes are capable of being configured to enter directly into the Tor network. We need an intern to configure, package, and document the process of making a tor-entry node. If the intern completes this task within the time frame they will have the opportunity to tackle custom configurations that will allow for Tor exit nodes on the mesh that allow small bandwidth Tor traffic from elsewhere to be run over the network to further obfuscate it.
Great! So….what does that mean? This … Read the restRead More