Kickstarter suspends Anonabox Tor router project

After days of critical scrutiny on social media networks, the wireless router that was supposedly a custom-built Tor privacy engine has been suspended by Kickstarter after raising nearly $600,000 in only a few days.

Kickstarter has suspended the crowdfunding campaign of a Tor-enabling wireless router that gained widespread media attention as a privacy device for the masses but left others questioning its legitimacy.

The Anonabox router was approaching $600,000 in donations on Kickstarter after only a few days. But, shortly after going live, content aggregation sites such as Reddit, began to light up with critical comments.

The Anonabox was pitched as a simple mobile, wireless device that offered plug-and-play Tor-grade encryption for any computer device.

Many pointed to the Anonabox's circuit board as being a cheap Chinese knockoff that could be purchased for as little as $20. The Anonabox was being sold for up to $51. Commenters also expressed concern over backdoors that could be inserted to allow anyone to track users once the device was enabled through a home wireless router.

"They lied about the prototypes, saying that they invented the device while the device is bought from Aliexpress [an online retail service based on China]," Reddit commenter 'htilonom' wrote in a post.

Computerworld emailed Anonabox's co-founder August Germar several days ago regarding security issues related to the device. He did not respond to the questions.

Germar did participate in a Q&A thread on Reddit, but commenters complained that he skirted the most critical questions about how custom the device really is or how secure it would be.

Tor (The Onion Router) is a free software project that conceals a user's IP address by bouncing online activity and all data through a random, worldwide network made up of more than 5,000 relays.

In one Reddit post, a self-proclaimed security expert called the Tor device a scam and said its makers were deceiving the public.

Anonabox's software, which was promoted as custom, is actually OpenWRT.

Online forums complained that that information had been withheld from donors.

In an email to donors Wednesday, Anonabox's Germar stated that "a few people think we should mention OpenWrt more, and that we use it as the OS for the Anonabox.

"We made sure it was in the images and website, but just to be extra clear on this yes, we are using the Open Source embedded device OS called OpenWrt. It's based on Linux which is also Open Source, and which we also love," Germar went on to say.

Commenters on the Kickstarter project site have even linked to $20 versions of the Anonabox-style wireless routers sold in Russia and China and added links to Anonabox's own Tor routing code to embed on the devices.

Join the CSO newsletter!

Error: Please check your email address.

Tags redditsecuritydata privacycomputerworldKickstarterprivacy

More about LinuxQ

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Lucas Mearian

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts