Skip to content

DIY instructions for building a Privacy-Preserving Router

License

Notifications You must be signed in to change notification settings

Krolang/Anacuei

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ANACUEI

Anonymous Networking And Communication Utilizing Evasive Infrastructure


It is well established that we live in an era of unprecedented digital surveillance. It is a threat to the liberties of all citizens. So when the Supreme Court of the United States reversed Roe v. Wade, I knew that many people would be prosecuted or killed because of it, and that the problem would be made worse by mass surveillance. I realized that my knowledge of internet privacy put me in a position to dampen the impact of the ruling, and I knew that the best way to do so would be to provide a way for others to seek help and lifesaving treatment without fear of their data being used against them. I decided to create a privacy machine, the ANACUEI Router, to help women seeking abortions and to help people remain anonymous under a repressive regime.

This point was driven even further home when, during the development of the project, the Iranian Government shut off most of the country's internet to conceal human rights violations. If you are reading this, distribute this material. Translate it. Get it to the people who need it.

Privacy is your first line of defense against an entity that is trying to infringe upon your rights. Everyone deserves the right to privacy, to safety. All the components utilized are open source and audited for security, privacy, and peace of mind.

Warning

A DISCLAIMER: The project is still in its infancy, so I cannot guarantee that it is free of any vulnerabilities. However, I am working to get it audited as soon as I can, and I am working to implement better security as fast as I can.

Later iterations will allow one to utilize [[Docker]] to consolidate the system into one device while preserving security, or even utilize some new technology to bypass ISP surveillance. For now, the hardware build should be enough to foil any state law enforcement that's prowling around looking for people seeking an abortion. And for the brave Iranian Protesters, I am constantly updating this documentation as I learn more about what your government is capable of.

[!IMPORANT] [[Usage|USAGE GUIDELINES]] [[LICENSE]] [[Iran|For Users in Iran]] (needs translation)

Hardware

  • [[OpenWrt|GL-iNet Router]] or a [[Raspberry Pi]]. I used the GL-iNet because I only had one Pi, which didn't have a built in Wi-Fi chip (If you use a Pi for this part, you NEED one with a built in Wi-Fi chip).

[!UPDATE] Setting up OpenWrt on a router with a built in Wi-Fi chip is no easier.

  • [[Raspberry Pi]]. This is in addition to the one you may have used for the router, as this one will be used as a[[ DNS]] Server running [[Pi-Hole]]. Newer Versions are always preferable, but my old Pi 2 B v1.1 worked in the end (even though it has been discontinued).
  • Ethernet Cables. You'll need two of these: one connecting the [[DNS]] to the router's LAN port, and the other connecting to the modem from the Router's WAN port.
  • 8GB microSD card. This will usually come with the pi. It will contain the Raspberry Pi's Operating system. NOTE: While I haven't completed it, It may be possible to run everything on a singular [[Raspberry Pi]] using [[Docker]]. I am in the process of doing this, and will update the documentation accordingly.

Building the System

From Hardware (GL-iNet + RPi)

  1. [[Raspberry Pi#Installing the Operating system|Install an Operating system on the Raspberry Pi]]
  2. [[OpenWrt#Setup|Set up and Configure the Router]]
  3. [[Pi-Hole#Installing PiHole|Install and configure Pi-Hole]]
  4. [[Testing|Make sure that everything works]]
  5. [[Firewall#Hardware Build|Configure the firewall]]

Within Docker (Raspberry Pi 4 B) (Work In Progress, Not Recommended)

Warning

This method of building the system is HIGHLY experimental. I have not gotten it to work. I do not recommend this method. However, I have included the documentation in its unfinished state such that anyone who can get it working has something to jump off of.

  1. [[Raspberry Pi#Installing the Operating system|Install the Host OS onto the Pi]] (follow the instructions that came with the pi for this).
    • Docker can only be installed on Raspbian through a convenience script, so I recommend choosing a different Linux distro so you can install from the repositories. Most of the tutorials recommended Fedora Desktop 33, but I used Ubuntu and just didn't install the graphical interface for docker. This ended up working very well.
  2. [[Docker#Installation|Install Docker on the Host OS]]
    • These instructions might vary depending on your chosen distro. This documentation uses Ubuntu as the Host OS.
  3. [[Containers|Set up the Containers]]
  4. Configure the Virtual Network

Note

OpenWrt supports OpenVPN and Wireguard VPN. However, I do not suggest Implementing A VPN on this system, even one as private as RISEUP VPN. For details see the [[Usage#VPN Guidelines|VPN warning]].

Additional Reading:

For Higher-Threat Situations

Living under an oppressive regime necessitates that extra steps be taken to secure your data and protect yourself. Specific advice is highly dependent upon your threat model; as such I can only give general advice.

1. Tails OS

Tails OS can be run off of an 8GB USB, and will erase any data upon restart. Traffic is routed through tor by default, and the OS contains many tools that will help with anonymity. You will want to verify their PGP signature to confirm that the Firmware hasn't been altered by a bad actor.

Tails OS official Download page

Important

If you know someone who already has Tails, you can clone their firmware. Instructions are on the official site's download page, near the bottom.

2. VeraCrypt

VeraCrypt is a tool that allows you to encrypt not just files, but storage volumes on your computer. It was Built with Plausible Deniability in mind, as you can specify a Hidden volume within another volume, such that you can protect your data in the event that you are forced to decrypt the volume. It can be run off of a USB, but it's best not to use it to encrypt a USB, as the way data is stored on these devices opens some vulnerabilities.

VeraCrypt Download Page

Releases

No releases published

Packages

No packages published