Hello, my idea is self explanatory, setting up a raspberry pi in some random public wifi, such as a airport, library, starbucks, hiding it, and using their wifi in order to have a log free vpn. Any thoughts?
*Thanks to everyone commenting, I didn’t expect this to get so much traction, sorry if I’m not able to respond to you
Sounds possibly illegal. Also, unless you’re planting this at Ron’s Coffee Shop or something, probably not going to get great connection.
Apart from the fact this is probably illegal (E.g you agree to their terms and conditions when you sign onto the WiFi in the first place and this won’t cover it) how are you planning on connecting into it remotely, they aren’t exactly going to set up a NAT for you.
That probably means a reverse connection with proxy on the Pi into your trusted network. So you’ve just let a device with keys to your kingdom out where anyone can grab it, extract the file system and connect back into you (which points the finger straight at you if they fancy a lawsuit).
It could be secured, and you could protect yourself with various cloud components and onion servers but then at that point why bother, you’ve already set yourself up with more grief than it’s worth.
Again, I design and implement enterprise and public networks, let me tell you that those will be found. Especially airports have high security in place, you’d probably have better luck in a library.
Keep in mind that the provider (the airport) will see where your device is, what it does, how it moves, etc.
You will, most of the time, need to accept terms of use. Maybe you are redirected to a captive portal.
Some thoughts on it:
It could work by opening a tunnel to you server at home and then accepting traffic from there me routing it back out. You will have problems if a proxy or protocol check is made to prevent vpns opened on HTTPS ports.
How will you deal with the device aging out of the captive portal?
Planting a device anywhere will be seen as a malicious act. Airports don’t like stuff laying around much
How would you deal with port forwarding?
Maybe if you connect the pi to a server and then route your connections through the pi or something like that…
So maybe look for something like a Raspberry pi wifi pineapple but with vpn encryption added??
Please don’t risk your freedom over free VPNs.
Plenty of ways to do this without port forwarding. You could use something like zerotier. That said, I agree with people saying that this is a bad idea legally. Plus, if you lose the hardware, you’re out the money it would have cost you for a years worth ofvps which would get you the anonymity you want without the legal implications. You can run your own vps/vpn for pennies a day if you shop around and run your own node. I don’t understand the benefit of doing this unless you are trying to establish your presence at a location that you’re not for plausible deniability.
Definitely possible, definitely against ToS lol.
I made a python script for a pi a long while ago that auto connected to any open wifi, either bypassed or forwarded through their captive portal then established a VPN connection to home. It then had its own wifi network that my devices auto connected to so that I’d always be going through a VPN without having to worry about connecting to open wifi. The pi can with me though.
It would be possible to run a VPN server or even proxy over SSH on a pi and use something like ngrok to tunnel the connection past the firewall.
Maybe you can do it the other way around? Perhaps you can setup the pi as a vpn client which connects to your server at home. Once connected make sure your routing is directed towards the pi’s vpn ip address. Don’t know if that works though
Why not just hire a digital ocean vps, it’s like 3 dollars a month and you have full SSH access?
Not feasible.
You’d need to setup some kind of port forwarding on the router of the public WiFi (which obviously you can’t) in order to talk to the pi over the internet.
Other solution would be the pi constantly asking your server “what do you want me do to next” kind of like a reverse bind shell and then make the tcp connection on your behalf returning a sort of pseudo tcp session. But the pi would need to talk to you first is the main idea here.
https://youtu.be/b7qr0laM8kA, I found this and remembered your post. Hope it helps!
If your goal is log-free VPN, have you tried ToR?
Lmao what. Duh you can (illegally and easy to track back to ya dumb ass) but why? They will have shit WiFi and probably will change the password and lock you out after a month anyway. Take what it costs for the pi and just get a real vpn with decent speeds and security. I pay almost nothing for mine for a year and route everything through it since ya know, it’s not at the speeds of a fucking airport WiFi hotspot. Many places actually turn their WiFi off at night (Starbucks I knows does) so it won’t even be useful for half the day.
I do not hack, nor do I understand any of this talk. I’m not sure why I am even part of this sub Reddit, but I am inclined to learn.
You are at this point trying modifying their local network without their permission.
If you went to court over this, you would no doubt be charged. Modifying a network without authorization alone is a misdemeanor in most states and can be increased charges depending on the case.
The only one with a gigabit fiber connection
Is that a Mr. Robot reference?