" $559,178 pledged of $7,500 goal " Again, this goes back to people not understanding that you don't want ALL your traffic (especially plaintext stuff) over Tor because the Tor exits can/are being watched. And I feel it's just going to be another thing where rather than spread word of Tor for the better, it's just going to overload what we already have. It is a neat idea, but I think a VPN would be better, but obviously not always free like Tor is.
So? You can't get the real ip address of the tor user unless someone has access to both the exit node as well as the starting node and if you setup entry node as one of your own server(you can force do this) what does it matters even if the exit node is controlled by the NSA?
Because if what isn't encrypted contains your login or other identifying information, like a lot of things that are sent over your daily connection, then it doesn't matter that your IP is hidden. Your IP is only one part in what exposes you. You have all the issues of https://panopticlick.eff.org/ along with the OS and what other software is being used.
Take caution on this one! Anonabox scam - Why I don't trust them! https://www.reddit.com/r/technology/comments/2je9ms/anonabox_scam_why_i_dont_trust_them One particularly worrisome point:
Anonabox Promises Total Online Anonymity That's Easy, Open Source, and Cheap Note: There is a FAQ at the Kickstarter website, which is worth reading through to the end. It is opensource software and you can review and compile it on your own if you are skeptical about backdoors and such cited by the skeptics. Also, they are working very closely with the Tor Project team on it which will provide valuable feedback in terms of testing it before it goes out the door. The FAQ is really quite revealing as to how versatile it is configuration-wise, so make sure you do check out the answers to the FAQ questions or ask them anything you are concerned about. -- Tom
Privacy Router Anonabox Gets $600K in Crowdfunding—And Huge Backlash http://www.wired.com/2014/10/anonabox-backlash/
I agree wholeheartedly with the final paragraph of the Wired article: As with all privacy technology, no single tool provides complete security or anonymity. Instead, fully protecting yourself requires a change in behavior to consider the privacy consequences of every action online—what hackers and spies call “operational security” or “opsec.” And that can’t be bought in a box. “There’s not much point in having an opsec tool,” says PORTAL’s Rogers, “if you don’t have an opsec frame of mind.”