{"id":449,"date":"2014-08-15T14:20:17","date_gmt":"2014-08-15T14:20:17","guid":{"rendered":"https:\/\/melangedmaculateme.wordpress.com\/2014\/08\/15\/a-portable-router-that-conceals-your-internet\/"},"modified":"2023-07-28T16:26:12","modified_gmt":"2023-07-28T20:26:12","slug":"a-portable-router-that-conceals-your-internet","status":"publish","type":"post","link":"https:\/\/melange.dmaculate.me\/home\/2014\/08\/15\/a-portable-router-that-conceals-your-internet\/","title":{"rendered":"A portable router that conceals your Internet traffic"},"content":{"rendered":"<blockquote>\n<p>Called Personal Onion Router To Assure Liberty (PORTAL), the project is a pre-built software image for an inexpensive pocket-sized \u201ctravel router\u201d to automatically protect its owner\u2019s Internet traffic. Portal provides always-on Tor routing, as well as \u201cpluggable\u201d transports for Tor that can hide the service\u2019s traffic signature from some deep packet inspection systems.<\/p>\n<\/blockquote>\n<p><a href='http:\/\/arstechnica.com\/information-technology\/2014\/08\/a-portable-router-that-conceals-your-internet-traffic\/'>A portable router that conceals your Internet traffic<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Called Personal Onion Router To Assure Liberty (PORTAL), the project is a pre-built software image for an inexpensive pocket-sized \u201ctravel router\u201d to automatically protect its owner\u2019s Internet traffic. Portal provides always-on Tor routing, as well as \u201cpluggable\u201d transports for Tor &hellip; <a href=\"https:\/\/melange.dmaculate.me\/home\/2014\/08\/15\/a-portable-router-that-conceals-your-internet\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"link","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[358],"class_list":["post-449","post","type-post","status-publish","format-link","hentry","category-uncategorized","tag-tor","post_format-post-format-link"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":1440,"url":"https:\/\/melange.dmaculate.me\/home\/2011\/09\/16\/iran-blocks-tor-tor-releases-same-day-fix-the\/","url_meta":{"origin":449,"position":0},"title":"Iran blocks Tor; Tor releases same-day fix | The Tor Blog","author":"aslam","date":"September 16, 2011","format":false,"excerpt":"Via Scoop.it - Rights & LibertiesThe short version: Tor relays and bridges should upgrade to Tor 0.2.2.33 or Tor 0.2.3.4-alpha so users in Iran can reach them again. \u00a0Show original","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":478,"url":"https:\/\/melange.dmaculate.me\/home\/2014\/07\/31\/why-were-cert-researchers-attacking-tor\/","url_meta":{"origin":449,"position":1},"title":"Why were CERT researchers attacking Tor?","author":"aslam","date":"July 31, 2014","format":"link","excerpt":"Why were CERT researchers attacking Tor?","rel":"","context":"In \"CERT\"","block_context":{"text":"CERT","link":"https:\/\/melange.dmaculate.me\/home\/tag\/cert\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":409,"url":"https:\/\/melange.dmaculate.me\/home\/2014\/11\/01\/facebook-hidden-services-and-https-certs-the\/","url_meta":{"origin":449,"position":2},"title":"Facebook, hidden services, and https certs | The Tor Blog","author":"aslam","date":"November 1, 2014","format":"link","excerpt":"Facebook has launched its own hidden service on the Tor network. The service provides HTTPS access using a CA signed certificate, is not the norm for such services. This blog post is a good backgrounder and explains pros & cons of Facebook\u2019s security\/authentication choices.Facebook, hidden services, and https certs |\u2026","rel":"","context":"In \"Facebook\"","block_context":{"text":"Facebook","link":"https:\/\/melange.dmaculate.me\/home\/tag\/facebook\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":989,"url":"https:\/\/melange.dmaculate.me\/home\/2012\/06\/19\/the-tor-project-wins-knight-foundation-award-in\/","url_meta":{"origin":449,"position":3},"title":"The Tor Project wins Knight Foundation award in Journalism &amp; Media Innovation","author":"aslam","date":"June 19, 2012","format":false,"excerpt":"See on Scoop.it - Rights & Liberties To protect journalists and their sources worldwide by providing them with a toolkit to preserve their anonymity online. See on knightfoundation.org","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":490,"url":"https:\/\/melange.dmaculate.me\/home\/2014\/07\/04\/own-your-crypto-extremism-with-the-torrorist-tee\/","url_meta":{"origin":449,"position":4},"title":"Own your crypto-extremism with the Torrorist tee","author":"aslam","date":"July 4, 2014","format":false,"excerpt":"mostlysignssomeportents: Celebrate yesterday\u2019s news that the NSA classes all Tor users as \u201cextremists\u201d and targets them for indefinite, deep surveillance\u2026with fashion! Read more\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":377,"url":"https:\/\/melange.dmaculate.me\/home\/2014\/11\/26\/dhs-set-to-destroy-governmentwide-network\/","url_meta":{"origin":449,"position":5},"title":"DHS Set to Destroy Governmentwide Network Surveillance Records &#8211; Nextgov.com","author":"aslam","date":"November 26, 2014","format":"link","excerpt":"Categories of Records Headed to the Trash Folder Core Infrastructure \u2013 Email, contact and other personal information of federal workers and public citizens who communicate concerns about potential cyber threats to DHS; \u201cSuspicious files, spam and other potential cyber threats via an email network\u201d exclusively used within DHS\u2019 Mission Operating\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts\/449","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/comments?post=449"}],"version-history":[{"count":1,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts\/449\/revisions"}],"predecessor-version":[{"id":2426,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts\/449\/revisions\/2426"}],"wp:attachment":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/media?parent=449"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/categories?post=449"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/tags?post=449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}