Introducing Tor-Pi-do Version 1.0.1 for Raspberry Pi 3

We are happy to today announce the release of Tor-Pi-do Version 1.0.1 for Raspberry Pi 3. Tor-Pi-do Version 1.0.1 is a Linux distribution, also known as a distro, that enables the anonymous use of Tor with Mozilla Firefox on the Raspberry Pi 3.

This Linux distro brings together tools that enable secure Tor use on the Raspberry Pi 3, the most recent version of a series of credit card-sized, single-board computers developed to promote the teaching of basic computer science and computing in poor or developing nations. The idea for Tor-Pi-do Version 1.0.1 arose when the DarkOwl Cybersecurity team needed an easy way to provide IT support during a workshop in which they would be taking more than a dozen IT executives onto Tor, free software that enables anonymous communication over the Internet.

“We are incredibly excited by the release of Tor-Pi-do,” said Andrew Lewman, DarkOwl Cybersecurity Board Member. “The Raspberry Pi is an ideal device to leverage in an educational setting, and Justin’s work will allow a wider audience to explore the idea of internet anonymity.”

Justin Whitehead, DarkOwl Cybersecurity Red Team lead, led the Tor-Pi-do project.

On Tor-Pi-do Version 1.0.1, DuckDuckGo is the default landing page for the browser, providing a starting point from which users can further explore Tor. Additionally, Wicd, an open-source network manager, is included to provide a simple interface from which users can connect to wired or wireless networks with a wide variety of settings. 

This project is open-source and DarkOwl Cybersecurity encourages others to study, collaborate and improve upon the software. 

Download Tor-Pi-do by clicking the below button or visiting the download site here.

Justin Whitehead (@H0m3l3sshacker) received a B.S. in Computer Information/ Forensics and holds the following certificates: C|HFI, C|EH, CCFE, CPT, ITIL, ACE, and Security +. Justin has been an integral part of the OWL Cybersecurity penetration testing team for the past 4 years, conducting manual external and internal penetration testing across a wide range of sectors to help clients validate compliance with internal policy and industry best practices. Justin has 4 years of computer forensic experience and continues to engage in and educate himself on the front lines of forensics and incident response. Additionally, Justin is a regular speaker at security industry conferences such as DefCon, BSides, DerbyCon, and GrrCon.