List of references for Volume III - Anonymous Browsing! section 1-7

Lesson 2. Introduction to the Instructor!
__Websites::
Nathan’s Twitter #GotoNathan
https://twitter.com/gotonathan
Nathan’s Cyber Security Blog
https://www.stationx.net/nathan-house/

Lesson 10. Introduction to OPSEC
Websites:
The wall Street Journal article with James Kilpatrick

Lesson 12. Establishing Cover
Websites:
Name Generator

Google Alerts
https://www.google.com/alerts
The Baby Harvest Book link
https://www.amazon.co.uk/The-Baby-Harvest-terrorist-laundering-ebook/dp/B013AZ6MKS
Example - US Extradition Treaties

__Videos::
Youtube - DEF CON 23 - Chris Rock - I Will Kill You

Lesson 13. Identify Cross Contamination
Websites:
Remove delete yourself from the Internet

Google Removal Policy
https://support.google.com/websearch/answer/2744324
imgur - Removal info graphic
Imgur
Internet Archive
https://archive.org/
Wikipedia - Right to be forgotten

Lesson 14. 10 Rules of OPSEC
Websites:
The Grugq’s Hacker OPSEC blog
https://grugq.github.io/

Lesson 15. Authorship Recognition and Evasion Methods
Websites:
Anti-stylometry
https://www.jason.sx/reLANG/
L33t Converter
http://www.robertecker.com/hp/research/leet-converter.php?lang=en
Anonymous programmers can be identified by analyzing coding style
https://freedom-to-tinker.com/2015/01/21/anonymous-programmers-can-be-identified-by-analyzing-coding-style/
Hidden wiki - Anonymous writing section (Need TOR)
http://uhwikih256ynt57t.onion/wiki/index.php/Anonymous_Writing_Style
__Software::
Anonymouth

JStylo Anonymouth
https://psal.cs.drexel.edu/index.php/JStylo-Anonymouth
Signature
http://www.philocomp.net/humanities/signature.htm
Videos:
Youtube - Stylometry and Online Underground Markets

__Reports::
Report on the feaability of Internet scale author identification.

Lesson 16. The knock
Websites:
Example of activist information - UK
http://www.activistslegalproject.org.uk/Arrest%20Process%20and%20Your%20Rights5.pdf
AntiPolygraph

Reports:
The lie behind the lie detector

Videos:
Anti-polygraph Youtube channel

Don’t talk to the police

Lesson 17. Case Studies of OPSEC Failures
Videos:
OPSEC failures of spies

Section: 4 Live Operating Systems – Tails, Knoppix, Puppy linux, Jondo live, Tiny core linux

Lesson 19. Introduction to live operating systems
Software:
Rufus - To create a bootable USB/SD card with the ISO
http://rufus.akeo.ie/
Pendrive linux
http://www.pendrivelinux.com/universal-usb-installer-easy-as-1-2-3/
Tails - Manually installing onto a USB stick or SD card
https://tails.boum.org/install/
Hardware:
SanDisk 64GB Ultra Fit USB 3.0 Flash Drive - 130MB/s

Aegis Secure Key 3z - USB 3.1 Flash Drive

Ironkey
http://www.ironkey.com/en-US/

Lesson 20. Knoppix, Puppy linux, Jondo live, Tiny core linux, Window To Go
Websites:
Create Windows Live CD

Wiki - Windows to go

Knoppix Forum
http://knoppix.net/forum/forum.php
Knoppix linux live cd and usb flash drive persistent image how to
http://www.pendrivelinux.com/knoppix-linux-live-cd-and-usb-flash-drive-persistent-image-how-to/
JonDo - END OF LIFE!
https://anonymous-proxy-servers.net/blog/index.php?/archives/438-End-of-Live-DVD.html
__Hardware::
Ironkey
http://www.ironkey.com/en-US/windows-to-go-drives/ironkey-workspace-w700.html
Software:
Windows 7 live CD download

Tiny Core Linux
http://tinycorelinux.net/downloads.html
Puppy Linux
http://puppylinux.org/main/Overview%20and%20Getting%20Started.htm
Knoppix
http://www.knopper.net/knoppix/index-en.html
Jondo live cd
https://anonymous-proxy-servers.net/en/jondo-live-cd.html
Lightweight Portable Security (LPS) (Live CD)
https://www.spi.dod.mil/lipose.htm
Freepto (Live CD)
http://www.freepto.mx/en/
Subgraph OS
https://subgraph.com/sgos/index.en.html
Ubuntu Privacy Mix (Live CD)
https://www.privacy-cd.org/

Lesson 21. Tails
Software:
Tails Website
https://tails.boum.org/
Websites:
Tails encryption and privacy
https://tails.boum.org/doc/encryption_and_privacy/index.en.html
Tails and virtualbox
https://tails.boum.org/doc/advanced_topics/virtualization/virtualbox/index.en.html
Zero days is tails

Tails warning page
https://tails.boum.org/doc/about/warning/index.en.html
Claws mail leaks plaintext to imap
https://tails.boum.org/security/claws_mail_leaks_plaintext_to_imap/
Xkeyscorerules and Tails
http://daserste.ndr.de/panorama/xkeyscorerules100.txt
Nsa exploiting firefox bug to spy on tor users

Videos:
LightEater Demo: Stealing GPG keys/emails in Tails via remote firmware infection

Lesson 22. Tails Demo
Websites:
Tails documentation
https://tails.boum.org/doc/index.en.html
Trusting tails signing key
https://tails.boum.org/install/download/openpgp/#wot
Tails - Starting I2P
https://tails.boum.org/doc/first_steps/startup_options/index.en.html#boot_menu

Lesson 25. Which VPN protocol is best to use? and why?
Websites:
John Gilmore on ispec
https://www.mail-archive.com/cryptography@metzdowd.com/msg12325.html

Wikipedia - OpenVPN#Encryption

Reports:
Cryptanalysis of Microsoft’s PPTP Authentication Extensions (MS-CHAPv2)
https://www.schneier.com/academic/archives/1999/09/cryptanalysis_of_mic_1.html
spiegel.de - NSA leaks on ipsec
http://www.spiegel.de/media/media-35529.pdf

Lesson 26. VPN Weaknesses
Websites:
Smart DNS Proxy
https://www.smartdnsproxy.com/
Safe and Global Browsing

Reports:
Website Fingerprinting: Attacking Popular Privacy Enhancing Technologies with the Multinomial Naïve-Bayes Classifier

Touching from a Distance: Website Fingerprinting Attacks and Defenses
https://www3.cs.stonybrook.edu/~xcai/fp.pdf
Effective Attacks and Provable Defenses for Website Fingerprinting

Lesson 27. Can you trust VPN providers?
Websites:
CanaryWatch
https://canarywatch.org/
Example canary
https://www.ivpn.net/resources/canary.txt
EFF - Mandatory Data Retention

Secrets, lies and Snowden’s email: why I was forced to shut down Lavabit
https://www.theguardian.com/commentisfree/2014/may/20/why-did-lavabit-shut-down-snowden-email
Proxy.sh VPN Provider Sniffed Server Traffic to Catch Hacker
https://torrentfreak.com/proxy-sh-vpn-provider-monitored-traffic-to-catch-hacker-130930/
HMA VPN user arrested after IP handed over to the FBI
http://www.hacker10.com/internet-anonymity/hma-vpn-user-arrested-after-ip-handed-over-to-the-fbi/

Lesson 28. VPNs and Domain Name System (DNS) Leaks
Websites:
wikileaks.org - Alternative DNS
https://www.wikileaks.org/wiki/Alternative_DNS
Transparent DNS proxies
https://www.dnsleaktest.com/what-is-transparent-dns-proxy.html
Wndows - How to change DNS Servers
https://www.opennicproject.org/configure-your-dns/how-to-change-dns-servers-in-windows-7/
ipleak.net
https://ipleak.net/
Hack Like a Pro: How to Spoof DNS on a LAN to Redirect Traffic to Your Fake Website
http://null-byte.wonderhowto.com/how-to/hack-like-pro-spoof-dns-lan-redirect-traffic-your-fake-website-0151620/
Software:
A protocol to improve DNS security
https://dnscrypt.org/
Simple DNSCrypt
https://simplednscrypt.org/
Reports:
Pretty Bad Privacy: Pitfalls of DNS Encryption
https://www.ietf.org/mail-archive/web/dns-privacy/current/pdfWqAIUmEl47.pdf

Lesson 29. Setting up an OpenVPN client in Windows, Mac, iPhone and Android
Example openvpn config in a zip file
https://www.ivpn.net/releases/config/ivpn-openvpn-config.zip

Lesson 30. Setting up an OpenVPN client on Linux
Software:
Example openvpn config file
https://www.ivpn.net/releases/config/ivpn-openvpn-config.zip

Lesson 31. Preventing VPN Leaks - Firewalls and kill switches
Websites:
dnsleaktest
https://www.dnsleaktest.com/
How to Disable IPv6 in Windows 7
http://www.home-network-help.com/disable-ipv6-in-windows-7.html
How to Disable IPv6 in Mac OS X
http://osxdaily.com/2014/04/18/disable-ipv6-mac-os-x/
How to disable Ipv6 on Ubuntu, Linux Mint, Debian
http://www.binarytides.com/disable-ipv6-ubuntu/
How to Block non-VPN Traffic via Windows Firewall
https://www.bolehvpn.net/blocking-non-vpn-traffic.php
Windows - Comodo firewall - Configuring to Block All Non-VPN Traffic
https://forums.comodo.com/firewall-help-cis/configuring-to-block-all-nonvpn-traffic-t91413.15.html
Windows - Comodo - killswitch
https://www.bestvpn.com/blog/10218/build-your-own-vpn-kill-switch-in-windows-comodo/
Mac OS X - PF firewall - A guide to
http://thenewtech.info/2012/01/04/openbsd-pf-on-mac-osx-lion/
Mac OS X - PF firewall killswitch
https://airvpn.org/topic/1713-win-mac-bsd-block-traffic-when-vpn-disconnects/page-2#entry2532
Linux - Hardening your VPN Setup with iptables
https://www.inputoutput.io/hardening-your-vpn-setup-with-iptables/
DD-WRT - Kill Switch
https://www.privateinternetaccess.com/forum/discussion/17606/dd-wrt-kill-switch
Windows 10 - VPN Users at Big Risk of DNS Leaks
https://www.bestvpn.com/blog/28318/warning-windows-10-vpn-users-big-risk-dns-leak/
dnsleaktest.com - How can I fix a DNS leak?
https://www.dnsleaktest.com/how-to-fix-a-dns-leak.html
Reports:
A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial
VPN clients
http://www.eecs.qmul.ac.uk/~hamed/papers/PETS2015VPN.pdf
Software:
Windows - vpnetmon
http://vpnetmon.webs.com/
Windows - Tiny wall
http://tinywall.pados.hu/
Windows - vpncheck free
http://www.guavi.com/vpncheck_free.html
Mac OS X - PF firewall - icefloor
http://www.hanynet.com/icefloor/
Mac OS X - PF firewall - Murus pro
http://www.murusfirewall.com/
Mac OS X - Littlesnitch
https://www.obdev.at/products/littlesnitch/index.html
Linux - VPN-Firewall
https://github.com/adrelanos/VPN-Firewall
Linux - vpndemon
https://github.com/primaryobjects/vpndemon
Windows 10 - OpenVPN plugin to fix Windows DNS Leaks
https://github.com/ValdikSS/openvpn-fix-dns-leak-plugin
Videos:
Mac OS X - PF firewall - How to block VPN leaks with Murus pro
https://www.youtube.com/watch?v=bwmfyAEDirc

Lesson 32. Choosing the right VPN provider
Websites:
Beware of False Reviews - VPN Marketing and Affiliate Programs
https://vikingvpn.com/blogs/off-topic/beware-of-vpn-marketing-and-affiliate-programs
Which VPN Services Take Your Anonymity Seriously? 2016 Edition
https://torrentfreak.com/vpn-anonymous-review-160220/
I Am Anonymous When I Use a VPN – 10 Myths Debunked
https://www.goldenfrog.com/blog/myths-about-vpn-logging-and-anonymity
AirVPN.org (Italy)
https://airvpn.org/
IVPN.net (Gibraltar)
https://www.ivpn.net/
Mullvad.net (Sweden)
https://mullvad.net/en/
blackVPN.com (Hong Kong)
https://www.blackvpn.com/
NordVPN.com (Panama)
https://nordvpn.com/
Reddit - VPN
https://www.reddit.com/r/vpn
Simple VPN Comparison Chart - Detailed VPN Comparison Chart (No longer in excel)
https://thatoneprivacysite.net/
cship.org VPN guide
PAGE DOWN

Lesson 33. Setting up an OpenVPN server Part 1 - The fast and easy way
Software:
Setting up a OpenVPN server on Linux
http://www.arm-blog.com/setting-up-a-openvpn-server/
Software:
turnkeylinux.org
https://www.turnkeylinux.org/
turnkeylinux.org - openvpn
https://www.turnkeylinux.org/openvpn
AWS - amazon web services
https://aws.amazon.com/
hub.turnkeylinux.org
https://hub.turnkeylinux.org/

Lesson 35. Setting up an OpenVPN server Part 3 - Home VPN
Websites:
Simplest OpenVPN for Raspberry Pi
http://www.pivpn.io/

Lesson 37. What is Tor?
Websites:
Tor project
https://www.torproject.org/

Lesson 38. The Tor Network and Browser
Websites:
Torflow
https://torflow.uncharted.software/#?ML=-13.53515625,36.94989178681327,4
How to verify signatures for packages
https://www.torproject.org/docs/verifying-signatures.html.en
Tor Forum
https://tor.stackexchange.com/
Tor FAQ
https://www.torproject.org/docs/faq.html.en
Tor Blog
https://blog.torproject.org/blog/
Tor Wiki
https://trac.torproject.org/projects/tor/wiki
Tor’s Subreddit
https://www.reddit.com/r/tor
Tor Design Documentation
https://www.torproject.org/docs/documentation.html.en#DesignDoc
Software:
Download Tor Browser

Videos:
Training videos for downloading and installing Tor
https://media.torproject.org/video/TBBTraining/

Lesson 39. What should Tor be used for?
Websites:
Tor check
https://check.torproject.org/
Tor Project Warnings
https://www.torproject.org/download/download.html.en#Warning
Bittorrent over tor isnt good idea
https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea
Tor Overview
https://www.torproject.org/about/overview.html.en#thesolution

Lesson 40. Directory Authorities and Relays
Websites:
Consensus
http://86.59.21.38/tor/status-vote/current/consensus/
Tor Consensus Info Graphic


Do you get more anonymity by running a relay?
https://www.torproject.org/docs/faq.html.en#BetterAnonymity
Configuring a Tor relay on Debian/Ubuntu
https://www.torproject.org/docs/tor-relay-debian
The Legal FAQ for Tor Relay Operators
https://www.torproject.org/eff/tor-legal-faq.html.en

Lesson 41. Tor Bridges
Websites:
Tor: Bridges page
https://www.torproject.org/docs/bridges.html.en
Reports:
Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery PDF
http://www.cs.uml.edu/~xinwenfu/paper/Bridge.pdf
ZMap: Fast Internet-Wide Scanning and its Security Applications
https://zmap.io/paper.pdf
Configuring a Tor relay
https://www.torproject.org/docs/tor-doc-relay.html.en
Software:
bridges.torproject.org - You can get new bridges from this url
https://bridges.torproject.org/
Turnkeylinux.org
https://www.turnkeylinux.org/
tor-relay-bootstrap
https://github.com/micahflee/tor-relay-bootstrap
digitalocean.com
https://www.digitalocean.com/pricing/#droplet

Lesson 42. Tor Pluggable Transports and Traffic Obfuscation
Websites:
Tor: Pluggable Transports
https://www.torproject.org/docs/pluggable-transports.html.en
wiki Pluggable Transports
https://trac.torproject.org/projects/tor/wiki/doc/PluggableTransports
Here is an exploration of pluggable transports, how they look on the wire

This is a collection of TLS client hellos that were studied while trying to give meek a TLS signature like a browser.
https://trac.torproject.org/projects/tor/wiki/doc/meek/SampleClientHellos

Lesson 43. Torrc Configuration File
Websites:
Tails example torrc file
https://git-tails.immerda.ch/tails/plain/config/chroot_local-includes/etc/tor/torrc
Tor manual
https://www.torproject.org/docs/tor-manual.html.en
Tor sample torrc file
https://gitweb.torproject.org/tor.git/tree/src/config/torrc.sample.in
How to control which nodes (or country) are used for entry/exit
https://www.torproject.org/docs/faq.html.en#ChooseEntryExit
ISO 3166-1 alpha-2
https://en.wikipedia.org/wiki/ISO_3166-1_alpha-2

Lesson 44. Running other applications through Tor
Websites:
How do I check if my application that uses SOCKS is leaking DNS requests?
https://www.torproject.org/docs/faq.html.en#SocksAndDNS
Privoxy example configuration - Tor and Privoxy.
http://www.privoxy.org/faq/misc.html#TOR
Software:
privoxy.org
http://www.privoxy.org/
torsocks
https://github.com/dgoulet/torsocks/
torcap
PAGE DOWN
socat
http://www.dest-unreach.org/socat/
Proxy chains original
http://proxychains.sourceforge.net/
proxychains-ng
https://github.com/rofl0r/proxychains-ng
freecap
http://freecap.ru/eng/
widecap
http://widecap.com/
proxifier.com
https://www.proxifier.com/
proxycap.com
http://www.proxycap.com/
Whonix Stream Isolation
https://www.whonix.org/wiki/Stream_Isolation
Windows - Tortilla
https://github.com/CrowdStrike/Tortilla
corridor
https://github.com/rustybird/corridor

Lesson 45. Tor Weaknesses Part 1
Websites:
FBI Admits It Controlled Tor Servers Behind Mass Malware Attack
https://www.wired.com/2013/09/freedom-hosting-fbi/
Tor security advisory: “relay early” traffic confirmation attack
https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack/
“One cell is enough to break Tor’s anonymity”
https://blog.torproject.org/blog/one-cell-enough
Active attack on Tor network tried to decloak users for five months
http://arstechnica.com/security/2014/07/active-attack-on-tor-network-tried-to-decloak-users-for-five-months/
Why the Tor attack matters
https://blog.cryptographyengineering.com/2015/11/12/why-tor-attack-matters/
Reports:
‘Tor Stinks’ presentation
https://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document
‘Peeling back the layers of Tor with EgotisticalGiraffe’
https://www.theguardian.com/world/interactive/2013/oct/04/egotistical-giraffe-nsa-tor-document
LASTor : A Low-Latency AS-Aware Tor Client
https://web.eecs.umich.edu/~harshavm/papers/oakland12.pdf
Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries
http://www.ohmygodel.com/publications/usersrouted-ccs13.pdf

Lesson 46. Tor Weaknesses Part 2
Websites:
Experimental Defense for Website Traffic Fingerprinting
https://blog.torproject.org/blog/experimental-defense-website-traffic-fingerprinting
A Critique of Website Traffic Fingerprinting Attacks
https://blog.torproject.org/blog/critique-website-traffic-fingerprinting-attacks
Stream Isolation
https://www.whonix.org/wiki/Stream_Isolation
Bittorrent over Tor isn’t a good idea
https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea
List Of Services Blocking Tor
https://trac.torproject.org/projects/tor/wiki/org/doc/ListOfServicesBlockingTor
Reports:
Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services
https://people.csail.mit.edu/devadas/pubs/circuit_finger.pdf
Website Fingerprinting in Onion Routing Based Anonymization Networks
http://lorre.uni.lu/~andriy/papers/acmccs-wpes11-fingerprinting.pdf
Effective Attacks and Provable Defenses for Website Fingerprinting

Low-Cost Traffic Analysis of Tor
http://sec.cs.ucl.ac.uk/users/smurdoch/papers/oakland05torta.pdf

Lesson 47. Conclusions on Tor and mitigation to reduce risk
Websites:
Tor Metrics
https://metrics.torproject.org/?tag=cl&level=bs&level=ad#direct-users
Tor Blog
https://blog.torproject.org/blog/
Tor Design Documents
https://www.torproject.org/docs/documentation.html.en#DesignDoc

Lesson 48. Attacking Tor: how the NSA targets users’ online anonymity
Websites:
Attacking Tor: how the NSA targets users’ online anonymity
https://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity

Lesson 49. Hidden services – The Tor darknet
Websites:
Tor: Hidden Service Protocol
https://www.torproject.org/docs/hidden-services.html.en
tor2web
https://tor2web.org/
Videos:
Dr Gareth Owen: Tor: Hidden Services and Deanonymisation
https://www.youtube.com/watch?v=-oTEoLB-ses&feature=youtu.be&t=1998

Lesson 50. Finding Tor hidden services
Websites:
ahmia.fi
https://ahmia.fi/
onion.link
http://onion.link/
Uncensored Hidden Wiki
http://uhwikih256ynt57t.onion/wiki/index.php
not Evil - hss3uro2hsxfogfq.onion
http://hss3uro2hsxfogfq.onion/
Torch - xmh57jrzrnw6insl.onion
http://xmh57jrzrnw6insl.onion/
Candle - gjobqjj7wyczbqie.onion
http://gjobqjj7wyczbqie.onion/
Memex
http://www.darpa.mil/program/memex

Lesson 51. Other Tor Apps
Software:
Orbot: Proxy with Tor
https://play.google.com/store/apps/details?id=org.torproject.android&hl=en
Orbot: Tor for Android on Guardian Project
https://guardianproject.info/apps/orbot/
Orfox: Tor Browser for Android
https://play.google.com/store/apps/details?id=info.guardianproject.orfox
IOS - Onion browser
https://mike.tig.as/onionbrowser/
Tor messenger
https://trac.torproject.org/projects/tor/wiki/doc/TorMessenger
OnionCat- a VPN-adapter which allows to connect two or more computers or networks through VPN-tunnels.
https://www.onioncat.org/about-onioncat/

Lesson 53. Introduction to VPN and Tor Routers
Software:
Windows - openvpn client
https://openvpn.net/index.php/download/community-downloads.html
Tor Browser

Lesson 54. Custom Router Firmware for VPN & TOR Tunneling
Websites:
Example of using dd-wrt connecting to ivpn
https://www.ivpn.net/setup/router-dd-wrt-manual.html
Example - Tor on R7000
https://dd-wrt.com/wiki/index.php/Tor_on_R7000
Creating the Ultimate Tor Virtual Network
http://www.malwaretech.com/2015/08/creating-ultimate-tor-virtual-network.html
An example of setting up a VPN client with pfsense
https://www.ivpn.net/setup/router-pfsense.html
Software:
openwrt
https://openwrt.org/
Librewrt / libreCMC
https://librecmc.org/librecmc/home
dd-wrt
http://www.dd-wrt.com/site/index
flashrouters.com/vpn-types
https://www.flashrouters.com/vpn-types
Pfsense
https://www.pfsense.org/
opnsense.org
https://opnsense.org/about/about-opnsense/

Lesson 55. Off the shelf VPN and TOR Routers
Websites:
tinyhardwarefirewall.com
http://www.tinyhardwarefirewall.com/
Videos:
Tiny Hardware: Firewall Review
https://www.youtube.com/watch?v=nDuXd1wryu4
Hardware:
Invizbox
https://www.invizbox.com/learn-more/
anonabox.com
https://www.anonabox.com/
Safeplug
https://pogoplug.com/safeplug
Keezel: Online Freedom for Every Device Everywhere
https://www.indiegogo.com/projects/keezel-online-freedom-for-every-device-everywhere-wifi-security#/
Shellfire Box - VPN Evolution
https://www.indiegogo.com/projects/shellfire-box-vpn-evolution-security-technology#/

Lesson 56. DIY Hardware: TOR Routers
Software:
Browse Anonymously with a DIY Raspberry Pi VPN/TOR Router
http://makezine.com/projects/browse-anonymously-with-a-diy-raspberry-pi-vpntor-router/
Tor on R7000
https://dd-wrt.com/wiki/index.php/Tor_on_R7000
Hardware:
P.O.R.T.A.L. - Personal Onion Router To Assure Liberty
https://github.com/grugq/portal
TP-Link TL-MR11U, Portable Mini 150Mbps 3G Mobile Wireless Router,2000mAh
https://www.amazon.co.uk/TP-Link-TL-MR11U-Portable-150Mbps-Wireless/dp/B018DPLK8Y/ref=sr_1_1?ie=UTF8&qid=1449523319&sr=8-1&keywords=TP-LINK+MR11U
Guang TP-LINK TL-WR703N Mini Portable 11N 150Mbps Wi-Fi 3G Wireless Routers
https://www.amazon.co.uk/Guang-TP-LINK-TL-WR703N-Portable-Wireless/dp/B00PXRWYM2/ref=sr_1_2?ie=UTF8&qid=1449523434&sr=8-2&keywords=TP-LINK+WR703N
Gl.iNet Smart Router, Openwrt, 3g Modem, Mobile App Control, 16M flash Lastin Garden
smart router, next generation router
https://www.amazon.co.uk/generation-supporting-configuration-surveillance-downloading/dp/B00KQG0OAY/ref=pd_sim_sbs_23_6/276-0757863-3470419?ie=UTF8&dpID=41bgpCRGOWL&dpSrc=sims&preST=AC_UL160_SR160%2C160&refRID=107AEF6FQJH2K5EDFM1T
GL.iNet 6416, Mini smart router with OpenWrt
http://www.gl-inet.com/gl-inet6416/
Onoinpi
https://learn.adafruit.com/onion-pi/overview

Lesson 57. TOR and VPN Gateway Virtual Machines
Websites:
Whonix - Dev/Build Documentation/Physical Isolation
https://www.whonix.org/wiki/Dev/Build_Documentation/Physical_Isolation
pfsense - Advanced Privacy and Anonymity Using VMs, VPN’s, Tor
https://www.ivpn.net/privacy-guides/advanced-privacy-and-anonymity-part-6
pfsense - Creating the Ultimate Tor Virtual Network
http://www.malwaretech.com/2015/08/creating-ultimate-tor-virtual-network.html
Software:
pfsense.org
https://www.pfsense.org/

2 Likes