Oh no, you're thinking, yet another cookie pop-up. Well, sorry, it's the law. We measure how many people read us, and ensure you see relevant ads, by storing cookies on your device. If you're cool with that, hit “Accept all Cookies”. For more info and to customise your settings, hit “Customise Settings”.

Review and manage your consent

Here's an overview of our use of cookies, similar technologies and how to manage them. You can also change your choices at any time, by hitting the “Your Consent Options” link on the site's footer.

Manage Cookie Preferences
  • These cookies are strictly necessary so that you can navigate the site as normal and use all features. Without these cookies we cannot provide you with the service that you expect.

  • These cookies are used to make advertising messages more relevant to you. They perform functions like preventing the same ad from continuously reappearing, ensuring that ads are properly displayed for advertisers, and in some cases selecting advertisements that are based on your interests.

  • These cookies collect information in aggregate form to help us understand how our websites are being used. They allow us to count visits and traffic sources so that we can measure and improve the performance of our sites. If people say no to these cookies, we do not know how many people have visited and we cannot monitor performance.

See also our Cookie policy and Privacy policy.

Fast, wireless access to Tor? Just maybe

Watch blocked programs while recharging your phone – is this for real?


Portable Tor routers have a serious image problem. But one of only two companies to have actually done it right plans to fix that.Should you believe the hype this time around? Quite possibly, yes.

It was only a year ago that the tech community got excited about the idea of a small, lightweight router that would connect you with the Tor anonymizing service. Plug-and-play. No installing software or complex configurations.

Unfortunately, the Anonabox turned out to have some fundamental flaws, not least of which were its founders' habit of being less than truthful about their "custom" hardware and the product's failure to encrypt traffic.

The Anonabox finally made it onto the market after suffering an epic meltdown, and by banking US$600,000, it sparked a series of blunder-prone projects. There was TorFi, which was pulled off Kickstarter and disappeared; Project Sierra, which raised just $6,000 of a $150,000 goal; and Cloak, which raised just £7,000 of its £65,000 ($100,000) goal.

Also offering private browsing is USB plugin Wemagin, which did raise sufficient funds but last month started offering refunds, having completely missed its April shipping date. It still hasn't shipped.

And then there were two products that avoided scandal: Safeplug and Invizbox. These are both essentially the same: you plug a small box into your home router using an Ethernet cable, and then connect either wirelessly or through another Ethernet cable to the box. The box connects to the Tor network and away you go. They both cost $49.

But here's the rub: Even though both these products do what that say they will, they still have limited use. Why? Because a Tor router alone will not provide you with the kind of privacy that you clearly want if you are prepared to spend $50 on a piece of equipment just to get more privacy.

For one, if you are using your usual browser in the usual way, you are likely providing your IP address to websites even if you are running through Tor routers.

There is JavaScript, for one. Turn that off. If you are not going through HTTPS or SSL secure websites, you are also likely exposing your information. And if you aren't actively blocking ads, you are also likely exposing your data. And then there is the WebRTC bug in Firefox and Chrome that exposes your IP address.

What's more, the Tor network is slow – and often, really slow. Jumping between all those different relays takes a toll. Instant messaging and Skype are therefore out.

Many websites won't let you access content without JavaScript running. And the fact that you are actually using the Tor network is often visible, which has given many websites the option to cut you off if you are.

The BBC, for example, notes: "If you are using a Tor network you will not be able to play programmes in BBC iPlayer." And if a website is using CloudFlare to protect itself, you may find yourself forced to fill in a CAPTCHA just to gain access to a website.

It makes you wonder what's the point of having a Tor router at all.

Similar topics


Other stories you might like

Biting the hand that feeds IT © 1998–2021