The starting idea comes from a colleague that asked me: “Is it possibile routing all system traffic thougth TOR, using it as a sort of VPN?”. Yes, It’s possible, using a specific feature of Tor.
Some time ago I’ve written a post about Tor Onion Services (formerly known as hidden services), and how to host them on a spare android smartphone.
How to reuse an old Android smartphone left in a drawer? Turn it into a server for the hidden web!
TOR is an important tool. It has its benefits and it could be the perfect way for end users to cover their tracks, but the use of this tool in a corporate network can open up organizations to some risks.