Press "Enter" to skip to content

Would you buy an Onion Pi?

* Want the privacy advantages of TOR, but don’t want to install TOR on your computer?

* Want the privacy advantages of TOR, but can’t install it on your computer or mobile device?

* Want your friends, family, and guests to be able to easily anonymize — even if they aren’t geeks?

* Want anonymity you can take wherever you go?

That’s what Onion Pi is for. Sez its creator:

Using it is easy-as-pie. First, plug the Ethernet cable into any Internet provider in your home, work, hotel or conference/event. Next, power up the Pi with the micro USB cable to your laptop or to the wall adapter. The Pi will boot up and create a new secure wireless access point called Onion Pi. Connecting to that access point will automatically route any web browsing from your computer through the anonymizing Tor network.

Sounds easy? Probably is — after you build the Onion Pi device for yourself (from kits that are currently out of stock at that link). Uh oh. That’s quite a big catch.

Reader Scott who earlier turned Mark/Greylocke’s DIY Preparedness Thumb Drive Project into a turnkey device is interested in producing plug-and-play ready Onion Pi devices and thinks he may be able to sell them for $100 or so.

No financial interest on my part. But because he did such a great job on the thumb drives, because I know he can use both the money and the work, and because it seems like a good idea, I told him I’d put out a query.

Ready-made Onion Pi gadgets aren’t available yet. If they were, and cost in the $100 range, would you be interested? And do you believe others might be (e.g. your non-techie mom and dad who might use such a device if you showed them how)?

Scott said he’d monitor comments and do his best to respond to any questions, critiques, suggestions, etc. So have at it, please.

56 Comments

  1. akaGaGa
    akaGaGa July 22, 2013 6:37 pm

    Yes, yes, and YES! I’m surrounded by libertarian non-techies. At least some of them would join me in thumbing our noses at the NSA.

  2. ff42
    ff42 July 22, 2013 6:39 pm

    Am I reading this correctly, A $35 Raspberry Pi (okay $50 with a case) for $100?

  3. Joel
    Joel July 22, 2013 6:50 pm

    That sounds so cool I’d try to dig up $100, if I had some confirmation from more techish friends I trust that it would really have an effect.

    Let me make sure I understand: I plug this in between my laptop and my satellite modem, and hey presto I’m running Tor?

  4. UnReconstructed
    UnReconstructed July 22, 2013 7:14 pm

    HAH….I *knew* there was a reason why I bought 3 raspberry pi boards last year……

  5. Scott
    Scott July 22, 2013 8:44 pm

    @ff42 – that’s the board, the case, the SD card, the wifi dongle, the power supply, shipping…and the work of making it a Tor access point. I want to be clear that anybody so inclined with a modicum of Linux skillz could do this. It’s all there in the linked article.

    @Joel – no ‘in between’ anything physically but logically yes; it’s a wifi access point; it would plug into your sat modem, and your laptop would login wirelessly to the AP; auto-TOR. I would need to research your particular sat modem to be sure, but last time I looked, they acted like cable modems, mostly.

  6. hanza
    hanza July 23, 2013 2:57 am

    Claire: I’m glad you reposted that info on the DIY Preparedness thumb drive project. I just broke down and bought one.

  7. Woody
    Woody July 23, 2013 3:41 am

    I like the idea, sort of. Most of the people I know who are non technical are also not concerned about internet privacy. Ignorance is bliss. Many people I know who are technical don’t use TOR because it’s too slow. I only know one person besides myself who uses a SSH proxy or a VPN. “You have to pay for those”, they exclaim!

    I hope there are enough people willing to pay for this thing because I think it’s a real good idea. I just don’t know anybody with $100 who cares that much about privacy who hasn’t already taken steps to protect theirs. Almost everybody carries a personal tracking device in their pocket everywhere they go. This same device allows the government to listen to their personal conversations at will. Nobody cares enough to stop using it. I doubt there is much of a market for Onion Pi.

    Privacy is a quaint, old fashioned notion, destined for the dust bin of history. Very sad.

  8. ILTim
    ILTim July 23, 2013 5:28 am

    That would make a great gift. I almost wouldn’t bother saying much about what it does, why, or how and just let it be a silent background thing that “helps with security and privacy”.

    But as long as its a kit, I wonder if the same can be accomplished with Linux on the wrt54g for half the price – or free if you’re already running that router.

    Let me answer my own question, yes: http://www.agol.dk/elgaard/torap/

  9. Sawbuck
    Sawbuck July 23, 2013 6:11 am

    A great big YES.

  10. IndividualAudienceMember
    IndividualAudienceMember July 23, 2013 7:59 am

    Maybe.

    I’d have to read some favorable reviews first.
    If C.W. used one, I might too.

    I don’t know of anyone else who would use one.

    Can you plug a usb modem into it?

  11. Scott
    Scott July 23, 2013 8:10 am

    Can you plug a usb modem into it?

    Assuming you mean a cellular modem, no. It would take some code wrangling to make it work that way, which I’ve done for other projects in the past. The hardest part of that is buying the modem, and paying for the data upfront. It’s expensive, with a low ROI. I’d do it for the right $$$, though.

    Personally, I think there’s a play there for a Pi+4G, but I don’t have the baksheesh I used to have for play-time in the sandbox.

  12. MS Jordan
    MS Jordan July 23, 2013 8:20 am

    Scott
    1- count me in for 1 for sure and possibly 3 more
    2- If you go ahead with the project, add Joel’s to my request

  13. Kyle Rearden
    Kyle Rearden July 23, 2013 8:50 am

    The Onion Pi is a rather ingenious invention, but you are right Claire that having to build it first is a rather large catch. Perhaps it would be better for one of the crypto-anarchists to make it user friendly and then sell it only via Bitcoin.

  14. Scott
    Scott July 23, 2013 10:37 am

    @MS Jordan: I’m 99% sure I’m going to do it. Just shaking out some parts suppliers right now.

    @Kyle: Perhaps it would be better for one of the crypto-anarchists to make it user friendly

    That’s what I’m doing here, minus the bitcoin part, since I have zero experience with bitcoin, and don’t really want to start, unless it means a LOT more buyers. I also don’t know if I qualify as a crypto-anarchist, more of an AnCap type, though even that’s sketchy.

  15. Aleks
    Aleks July 23, 2013 11:40 am

    in my opinion, most non-tech-savvy users don’t care about being watched and won’t pay a dime, and definitely not pay $100.

  16. Joel
    Joel July 23, 2013 1:42 pm

    Aleks,

    Regarding most people you’re undoubtedly right. But there are still freedom-loving people who love their privacy but hate their command line. I’m one. Plug Scott in with enough people like me, and the project could be worth his time.

    The world needs encrypted/anonymized communications for the compleat idiot. Or at least I do. I want one.

  17. LibertyNews
    LibertyNews July 23, 2013 8:44 pm

    I’m not sure how well tor would work across a satellite connection — the latency may be a big problem.

    One big concern I have about this is updates. You really can’t just deploy Tor and not apply regular security patches.

  18. Scott
    Scott July 24, 2013 6:48 am

    @LibertyNews — I hadn’t considered updates. I’ll take a look at if / how I can make that happen.

  19. Paul Bonneau
    Paul Bonneau July 24, 2013 6:51 am

    Some of the comments here seem off. This thing has a huge market: everyone in the US who is concerned about privacy but who is not a geek. Even if that is only 0.1% of the population, that is a lot of Onion Pis! Anyway it’s crazy to get depressed about what majorities do or don’t do. Try reading Isaiah’s Job:
    http://mises.org/daily/2892

    That Adafruit company is a really cool outfit, and the owner is an interesting lady with some fine individualistic quirks.

    I have built a couple of these project boards. It’s no big deal really. A good excuse to learn how to solder. That site does a good job of hand-holding.

    The main problem with this is the slow TOR speeds. You are not going to sneak this into your home network to protect your family’s privacy; they won’t put up with the performance loss unless they are on board with privacy concerns. However this is a good device anyway. Just another device for poking snoops in the eye, and that ain’t a bad thing!

  20. Paul Bonneau
    Paul Bonneau July 24, 2013 6:56 am

    Oh, I wouldn’t be concerned about it being out of stock. Many of her project boards are like that. She probably has to order boards in small quantities until she gets a feel for the market. Just wait a bit…

  21. Tom
    Tom July 24, 2013 7:18 am

    Does this create a TOR exit node? I wouldn’t want to risk getting slapped with charges of transfering child porn for having a TOR exit node.

  22. Scott
    Scott July 24, 2013 9:06 am

    @Tom – the version I’m building & selling will not be an exit node.

  23. Tom
    Tom July 24, 2013 12:14 pm

    Well- Yeah !!

  24. David
    David July 25, 2013 10:06 am

    Eh. The problems with Tor aren’t with its setup/installation. Essentially you can download the Tor Bundle and run it. The problems arise when you want to use it -for- something. Media stuff, in particular, either (1) won’t work with the Tor Bundle, or (2) has huge performance problems.

    I’m not sure this is solving a problem for very many people.

    As for me? I just bought a Hisense Sero 7 tablet, rooted it, installed XPrivacy to keep my contacts & such private, installed Orbot to run Tor for nearly all apps, and set up an always-on VPN so the stuff that doesn’t run Tor still doesn’t give away my identity or location. It wasn’t hard, and has many times the capacity of the device under consideration here.

    Thing is: who wants the Onion Pi who can’t/won’t download an app that you can run on a computer you already own without even installing anything? If that’s not a large group, where are the customers coming from?

  25. David
    David July 25, 2013 10:07 am

    Oh, and of that group: how many would want Tor installed for them for that price, when tinkerers won’t have much trouble doing it for themselves?

  26. David
    David July 25, 2013 10:14 am

    Okay, one more: if you’re using apps for media, and they work acceptably even though you’re routing through Tor, are you really gaining any privacy/anonymity? If so…from whom? Advertisers will still identify you through precisely the same “fingerprinting” methods they use if you skip the Tor part. There are good reasons why the Tor Bundle is so restrictive.

    I guess your ISP will be out of the loop as far as what content you’re viewing goes. So that’s something. But how much is that, by itself, worth?

    I do like the idea. But I think a useful version would need to run on a more powerful device, and would need to inspect the info passing through in order to anonymize in a meaningful way. Which would take lots and lots of work.

    Anyway. Doing something, many will say, is better than doing nothing. And that’s sort of true, if the “something” actually moves you toward a goal you can articulate. Does this?

  27. David
    David July 25, 2013 10:28 am

    Just had a thought: I think installing a VPN, instead of Tor, is probably a better idea. You get precisely the same degree of “location” anonymity as far as the sites you connect to goes, AND hide your browsing from your ISP, without much of a performance hit (esp compared to Tor). Theoretically the people running the VPN could snoop on your traffic…but how much does that mean, considering all the data the users of this system would be (already are) giving to folks like Facebook & Google? And how likely are they to do that? Especially if your VPN terminates in a foreign country? (Though that might keep Netflix from working properly, but there are DNS hacks to deal with that, and those could be built in so users don’t notice.)

    Only thing is, I wouldn’t use a Pi-type device for the VPN. I’d buy a cheap router that could run dd-wrt (or Tomato, or whatever). In fact I have that setup running right now in my house. There’s a garden-variety WiFi network, and there’s also another one. Connect to network #2 and you’re using a VPN.

  28. Claire
    Claire July 25, 2013 10:51 am

    David — You have some good points. But everything you say implies that people are eager to tinker with their computers.

    I know lots of people who care about privacy but are simply freaked out at the idea of doing anything with their computers beyond point-and-click.

  29. Paul Bonneau
    Paul Bonneau July 25, 2013 11:17 am

    Both sides have good points. This will need to be offered as a completed device for the non-tinkerers though.

    I think there is a general point too. There are any number of ways to foil or at least inconvenience the snoops. This is just another example. We don’t know which of them will come to dominate, which will be developed to be robust and easy to use. It’s better to have people out there experimenting.

    I’m a great fan of VPN as it covers 80% of the privacy problem (American ISPs) with 20% of the cost (still runs pretty well and easy to switch off if needed and not too bad monitarily). It’s also not outside the capabilities of most non-nerds. It’s pretty easy to not use google, and reducing the leaking of data to advertisers is also not so hard (I like the simplicity of the hosts file for one example).

    I haven’t seen what dd-wrt or Tomato is; will have a look.

  30. David
    David July 25, 2013 11:35 am

    Claire-

    Funny. I thought I implied the opposite? I thought I was saying that tinkerers don’t need it and others probably won’t -want- it. In short, I don’t think there’s much of a market for this.

    Plus, the Tor encryption is only “in transit” and inferior, performance-wise, to a VPN. So if I were building this I’d do it very differently…the VPN gateway device (which can be ordered from many, many VPN providers) is just as simple to use but in general probably a better value.

    So if there -is- a market for this, it strikes me as likely that the customer base would expect more than this device would actually deliver, which might cause them to be insufficiently careful. Bugs me.

  31. David
    David July 25, 2013 11:43 am

    Paul-

    Obviously I like VPNs too! And open-source software/hardware in general.

    But…you know, I used to dislike Android devices. Not because of Android per se, but because of the over-reaching applications. Take a look at the permissions the Facebook app claims to “need” for instance…yech. Essentially Facebook -owns- any tablet that runs it. But with an app like XPrivacy to create privacy “sandboxes” plus a VPN…it becomes really, really hard for people to snoop. Add in Orbot (which can transparently force either the entire system or individual applications to use Tor) and it becomes a really cool way to deal with the internet without revealing much. I’ve even bought a micro-USB “OTG” dingus so I can connect a USB hub, and with keyboard/mouse it’s become my favorite internet browsing toy. And it’s great for watching movies, too.

    If anybody else out there’s looking for a reasonable approach w/o a lot of hassle (sorry, some is currently required)…well, it made -me- happy when I realized what I had. My wife’s got one too, now.

    -D

  32. David
    David July 25, 2013 12:04 pm

    Another way to look at it:

    1) Using Tor is precisely equivalent, location-privacy-wise, to using a VPN.

    2) As far as encryption between the sites you visit and either the VPN gateway/endpoint or the first/last Tor node go, they’re also precisely equivalent (in that you still need SSL to prevent eavesdroppers on that leg, and the sites you’re connecting to still see all the crap you send ’em).

    The single edge that Tor provides: It’s much harder for a single person/entity to know where your traffic originates (this applies mostly do desktop/laptop situations; mobile devices send all sorts of info). However, “rogue” Tor nodes, some operated by the US gov’t, have always existed.

    The advantage a VPN has over Tor: reliability and performance performance performance.

    *Neither* gives you any protection at all vs. “fingerprinting” of your computer/device, any network-location type info the device is sending, uploading of all your contacts from a mobile device, or any hacks that don’t apply specifically to reading the traffic between (a) your device and your VPN gateway or (b) your device and the last Tor node your traffic passes through on the way to a website you’ve chosen to visit.

    Frankly I think a focus on in-transit encryption is (to put it politely) misguided. The bigger problems exist with the sites that gather/sell/trade your data.

    I’m sorry if that sounds as if I’m saying online privacy is too hard to deal with. I don’t want to say that. But I am saying that it’s -dangerous- to play with this stuff if you’re actually trying to hide something. Or if you actually want privacy from internet snooping. Right now, you have two choices: learn a lot about this stuff, or accept that your info’s available to a lot of people. And even learning a lot isn’t a guarantee. At all.

    This ain’t about me. It’s about reality.

  33. Paul Bonneau
    Paul Bonneau July 25, 2013 3:33 pm

    I more or less agree. However it’s worthwhile I think, putting barriers up for the snoops. Domestic ISPs are just too easy for govco. So go with an offshore offshore VPN company using offshore servers.

    I was just looking at this WPA side-channel attack:
    http://lifehacker.com/5305094/how-to-crack-a-wi+fi-networks-wep-password-with-backtrack
    Ethernet starts to look good. 🙂

    Also dd-wrt and Tomato don’t have this vulnerability…

  34. Scott
    Scott July 25, 2013 5:44 pm

    David and Paul – I don’t think yall have brought up any objection to the idea that I don’t agree with. But, look at what you’re saying:

    I just bought a Hisense Sero 7 tablet, rooted it, installed XPrivacy to keep my contacts & such private, installed Orbot to run Tor for nearly all apps, and set up an always-on VPN

    Frankly, that’s gibberish to an enormous number of people. Hacking routers — just as much so. I’m comfortable doing all of that, but there is some non-zero number of people who are not, yet want some kind of protection, even if it’s only cloaking, from PRISM-like activities. And that’s what this does. No more, but no less, either.

  35. Claire
    Claire July 25, 2013 6:20 pm

    Scott — Yep. That’s my take on it, too (though from a much less techie position than yours). In my experience, people who are highly technically adept often take for granted that what’s simple to them is simple to everybody. Or at least they take for granted that everybody who cares about X would be willing to jump in and try technological Y and Z.

    That some people are absolutely terrified by the idea of doing anything other than point and click doesn’t mean that those people don’t care about privacy. I’m with you.

  36. David
    David July 26, 2013 7:16 am

    Scott & Claire-

    I really wish people wouldn’t say I’m taking stuff for granted, when I’ve clearly stated that I’m not. Yes, I threw techie stuff in there. There are multiple audiences here. I pointed out viable alternatives. I was writing stuff for Scott, Paul, Claire and the Commentariat in general…different perspectives, and not all will be interested or understand all of it.

    But this is really simple, so let me just lay it out:

    1) Tinkerers don’t need such a device.
    2) Non-tinkerers generally won’t want it.
    3) To offer people the benefits (such as they mostly aren’t) of your proposed device, you’d probably do -better- to sell them a VPN gateway. Or at least they’d be happier with the result and more likely to actually use it.
    4) This does not mean that your customers would have to create a VPN gateway. Please stop saying/implying that I said that.
    4) Contrary to your claims and many non-techie people’s likely beliefs, the device you propose would do -nothing- to protect vs. Prism, as Prism is a means for collecting data from websites, not snooping on data in transit.
    5) Offering devices to give “some kind of protection” that do not in fact provide the type of protection that is claimed (anonymity, in this case) AT ALL is…not cool. I’d use other words, but this isn’t my blog. Tor does -not- provide any sort of anonymity if used incorrectly, which is why the Tor Browser Bundle exists and is also one of the reasons why Tor is not usable in practice by most people for most purposes (the other being performance).
    6) I’m not making this up. I’m sorry if you don’t like it.
    7) This is still not about me, or what I think people want to do. I don’t know where that’s coming from. I wish it would go away.

    I’m done now. I hope people will read what I’ve actually written rather than the characterizations thereof. But I can’t make ’em.

  37. David
    David July 26, 2013 7:27 am

    Maybe you guys don’t want to believe me, though, because of something about the way I write? Here’s another guy talking about it. I googled “correct use of Tor” and came up with this in a few seconds.

    http://www.brainonfire.net/blog/tor-best-practices-anonymous-browsing/

    Note this statement early on: ” However, using Tor without some basic precautions is worse than not using Tor at all, leading to privacy violations, data theft, and security concerns.”

    Frankly I think this guys misses a lot too, but the main point is this: Scott’s customers will -not- automatically benefit from the device he wants to sell (outside of hiding stuff only and specifically from an ISP…and a VPN is better for the purpose). They’ll likely be worse off, instead.

    Using Tor w/o a lot of other work actually makes “fingerprinting” (meaning “identifying your computer…and you, too, if you log in to anything”) -easier- than if you don’t use Tor.

    Just how it works.

  38. Scott
    Scott July 26, 2013 8:48 am

    David,

    1) I wouldn’t try to sell to tinkerers, as they will be doing it on their own. I actively encourage people to do this on their own, as well, to the point of offering to help them for free.

    2) That’s disproven already, as evidenced in the comments to this post. Non-tinkerers do want it…they have said so, right here.

    3) Maybe a VPN gateway is what I make next. I dunno, but it sounds cool.

    4) Not sure what you mean about implying anything.

    The second 4) At least one government program, and I believe it was PRISM but it was certainly NSA, had a black box in an ISP collecting information from subscribers: http://www.theverge.com/2013/7/21/4541342/isp-owner-describes-nsa-box-that-spied-on-customers

    5) I really can’t respond to this. TOR does provide anonymity at the layer it is designed for. I don’t see anyone claiming that it goes beyond that, or that it’s a one-fix-for-all.

    6) Who said you were making it up? I’ve agreed with almost everything you said, except the claim that non-tinkerers don’t care.

    7) Who said it was about you? I value what I’m learning from you, and it helps me to make a better product.

    I know that security, and there’s very vague term, is not a simple fix like a TOR anonymous middlebox. I know that there is vastly more that many individuals can do. It’s probably fair to say that those who bother to think about it know themselves that there’s more they can & should do. But I’m not going to argue that if they don’t go all the way, that they do nothing.

    I’ve been having this same argument about computer & network security since 1995. Literally the only thing different 20 years later is that it’s about individuals instead of Fortune 500 companies. And 20 years later, I still don’t know what to say to the folks who say all or nothing, so I mutter under my breath about the perfect being the enemy of the good, and think of the Texas Tornados song “A little bit is better than nada”

    Meantime, I’ll pledge to take all of your objections under consideration because they’re good ones, and read more articles about the correct way to use TOR.

  39. David
    David July 26, 2013 10:04 am

    Scott-

    Much less ad hominem there, for which I thank you. Still a few straw men though…I never said or implied “all or nothing”…I did say that your specific device is unlikely to be used much even if purchased, and is likely to do more harm than good if it -is- used. That’s not a defeatist attitude in action. It’s a specific judgment of this particular idea. Of course you may choose to infer some sort of general principle about me if you dislike my actual points. That’s beyond my control.

    I would also argue that non-tinkerers who say they want this product are much like consumers everywhere: they buy benefits, not features. I think you have misrepresented the benefits. Though I don’t believe that was your intent.

    A chainsaw is a tool, and I like mine. Doesn’t mean a chainsaw should be always (or randomly) turned on or sold to people who don’t have a reasonable way to know which end cuts. Of course you can offer any product you like, and make whatever claims strike you as reasonable.

    Sometimes taking a step is not helpful–the question is: in an objective sense, would users of your device be better or worse off from an anonymity standpoint? I say: worse, probably, but it’s somewhat arguable. (I could get into random ISP traffic sniffing vs. website/advertiser data gathering, and the ease of identifying an ISP customer as a Tor user–possibly the only local Tor user at a given moment–if you really want me to.)

    If a user thinks he or she can do anything at all with a higher expectation of freedom from consequence (legal or other, by which I specifically mean to include “without revealing his/her identity to any website”) because of a device like the one you propose, that user has been grievously misled.

    -D

  40. Scott
    Scott July 26, 2013 11:39 am

    Now, where in all the verbiage, have I made an ad hominem?

    And, where in all this verbiage have I claimed any benefits or made any claims at all, beyond those of TOR itself?

    And, where in all this verbiage have I or anyone claimed freedom from consequence? Or that this would include “without revealing his/her identity to any website”? I repeat, ??? The word “reveal” by itself is used in two comments here, both of them yours. Never mind the phrase, never mind the concept.

    I get that you’re not in agreement with the concept, and you’ve done a fine job of explaining why. But you seem to be imputing claims to me, or to the Onion Pi tutorial, or to TOR, that just aren’t there, in any link, this post itself, or the comments. That, I don’t get.

  41. David
    David July 26, 2013 1:40 pm

    Scott-

    Stating that my views as expressed are the result of ideas I’ve expressly stated I don’t hold, rather than engaging the points I’ve actually made is, to my mind, nothing but an ad hominem attack. Taking a techie bit out of the middle of what I’ve said, labeling it gibberish (even if not to you) is…well, perhaps not quite ad hominem. But close, as by implication you are saying that my arguments are..what? Gibberish. And therefore my conclusion is wrong, even if the bit you quoted was an example of another system and not relevant to my actual argument re: your idea. I agree there’s room to disagree on the point, though, so I apologize. Still: got my dander way, way up. Though that wasn’t just you…

    There are more examples but: “there is some non-zero number of people who are not, yet want some kind of protection, even if it’s only cloaking, from PRISM-like activities. And that’s what this does. No more, but no less, either.”

    If you read docs from the Tor folks, they’re chock full of more caveats than I’ve even considered addressing here. Stuff doesn’t do what you want just ’cause you want it to.

    Next, if revealing identity is okay, what’s anonymity about?

    I’m done with all topics here, and this blog too for a while. Will probably tune in again at some future point. You guys can probably find me if you want to.

  42. BrockTownsend
    BrockTownsend July 26, 2013 9:11 pm

    Yes.

  43. semperfido
    semperfido July 26, 2013 10:02 pm

    Put me down for two.

  44. Jebediah
    Jebediah July 26, 2013 10:05 pm

    David is a classic example of an Internet chat “troll”.

  45. Lt. Greyman, 21st Bell (The BlacksJacks) NVA
    Lt. Greyman, 21st Bell (The BlacksJacks) NVA July 26, 2013 10:16 pm

    Thank you. Our organization will probably want to buy in bulk and I will pass the word along. Let you know in less than a week.

    Freedom!

  46. John Mosby
    John Mosby July 26, 2013 10:52 pm

    Not just yes, but Hell Yes. I’m a knuckle-dragging Luddite, and despite numerous attempts to install TOR, have failed dismally every time.
    DOL,
    John Mosby

  47. leonard
    leonard July 27, 2013 12:45 am

    I have very little interest in computers and technical aspects of computers. I would like to confound the would be rulers. In every way possible.

    If I get independent corroboration that I can reasonably trust that it works and if it works by more or less by plugging the thing in, I’d buy it.

  48. Jimbo
    Jimbo July 27, 2013 4:19 am

    I’ll take two.

  49. nate
    nate July 27, 2013 4:44 am

    This really isn’t all that hard to set up. I could chef an entire installation for this fairly quick if I were so inclined to reinstall my Pi.

    If you can’t find a Pi for about 20 bucks more there’s always the beagle board.

  50. Tripwire
    Tripwire July 27, 2013 5:45 am

    I’m not techy, I’m an old fart that ain’t sure this new PC fad is gonna take hold, hell I’m still holding out on fire, but here is what I don’t understand, IF some ol boy can take a few colored wires and spit and make a gadget like this why wouldn’t the all powerful NSA just make one that cracks this one? These are the folks who break codes and such for a living and they have all the money and brain power in the world at their disposal. If they can develop the stuff to listen to every fart that squeaks out why can’t they counter this thing.

    As I said I’m an old fart and even if the “New” Government don’t think I have any rights left they apparently ain’t give thought to my opinion on that issue.

    I know I’m not a terrorist, and I know I’m not plotting to blow up the new Reichstag in the new Berlin on the Potomac and I don’t have kiddy porn on my PC unless they put it there.
    So I guess being an old fart who served my country because I believed in doing so and being old enough to remember when the Constitution and Bill of Rights really meant something to our ellected leadership I have to assume if men in the new Nazi uniforms are beating my door down then I’m heading for the New Dachau Amerikan style or they intend to just murder me, then I will take as many as I can with me into the night.

    If you saw the movie ” We were soldiers” you will remember at the start when the Viet Mien trooper was looking down at the wounded Frenchman he asked his officer if they were taking prisoners, he replied ” No, if we kill all they send they will stop sending them..Bang”

    It seems to me that we the people are the only hope for America and a gadget on my PC ain’t gonna stop them so maybe we need to say stop real loud and inform them that we have now reached the point of no return, either stop fkin with us or we will simply kill you. Now maybe that last statement makes me a target but it’s time to get off the X and long past time to put a stop to this crap.

    But who will be the one to fire the next shot heard round the world? Ever wonder why folks like us can’t get up a big march on DC? well it’s because we have jobs, we have responsibilities and we don’t have rich unions to rent buses to haul us there and feed us while we march around.

    They got us by the short hairs and i see nothing good coming. So I think I’ll pass on the $100.00 widget and buy more ammo cause god knows the soap box and the ballet box ain’t working.
    TJ Reeder
    Texas

  51. A Stranger in a Strange Land
    A Stranger in a Strange Land July 27, 2013 6:49 am

    Yes, I would buy several at that price.

  52. roger
    roger July 27, 2013 10:57 am

    roger

  53. Jim Klein
    Jim Klein July 28, 2013 12:37 pm

    I love business–I hope Scott sells a ton and I hope every buyer is even happier than they expect.

    This is a voting thread, so I’m voting—on “Most Relevant Comment to the Situation As It Is”

    Tripwire, 7/27

    To clarify, secure communications are absolutely essential to tactical situations. So when tactical situations arise, I’m changing my vote…I’ll see to what, then. But until that time, the most common strategic error in history is fighting yesterday’s war. When that tactical scenario arises, today will be yesterday, communications-wise.

  54. Kent McManigal
    Kent McManigal July 29, 2013 4:22 pm

    All the above just makes me wanna burn my computer and go back to my stone tools and greasy skins.

  55. Pat
    Pat July 30, 2013 9:35 am

    “All the above just makes me wanna burn my computer and go back to my stone tools and greasy skins.”

    Well, smoke signals and tom-toms might work for communication. But don’t lose the more sophisticated weaponry when the tyrannocritters come after you.

    And even this works well when the ammo pouch is empty. http://www.excaliburcrossbow.com/catalog/crossbow/matrix_380_blackout.
    Of course, it ain’t cheap… (But I would love to have it.)

Leave a Reply