{"id":11130,"date":"2014-10-03T11:31:13","date_gmt":"2014-10-03T11:31:13","guid":{"rendered":"http:\/\/www.recantha.co.uk\/blog\/?p=11130"},"modified":"2014-10-02T18:51:59","modified_gmt":"2014-10-02T18:51:59","slug":"ethical-hacking-experiment-uses-raspberry-pi","status":"publish","type":"post","link":"https:\/\/www.recantha.co.uk\/blog\/?p=11130","title":{"rendered":"Ethical hacking experiment uses Raspberry Pi"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/i0.wp.com\/static.guim.co.uk\/sys-images\/Guardian\/Pix\/pictures\/2014\/9\/29\/1411988822003\/0be4350b-2e5b-4d78-a4fa-bf1b39ebb6e4-460x276.jpeg?resize=460%2C276\" alt=\"\" width=\"460\" height=\"276\" \/><\/p>\n<p>In June, European law enforcement agency Europol, backed by German ethical hacking company\u00a0SySS, conducted an experiment in London. The experiment involved setting a mobile Raspberry Pi unit up as a wifi\u00a0hotspot to allow connected devices access to the internet. It was set-up as a public hotspot so anyone could connect to it. They just had to agree to the terms and conditions&#8230; And therein lies the catch. The T&amp;Cs contained a &#8216;Herod clause&#8217; by which users agreed to hand over their first born child to the company. Although the company has no intention of enforcing it, of course, it does show that you should always be careful about what you sign up for. The hotspot also contained no encryption so anyone using it found their passwords were transmitted in plain text, according to <a href=\"http:\/\/www.theguardian.com\/technology\/2014\/sep\/29\/londoners-wi-fi-security-herod-clause\" target=\"_blank\">this report from the Guardian<\/a>.<\/p>\n<p>The experiment was deployed in Canary Wharf and also near the Houses of Parliament.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In June, European law enforcement agency Europol, backed by German ethical hacking company\u00a0SySS, conducted an experiment in London. The experiment involved setting a mobile Raspberry Pi unit up as a wifi\u00a0hotspot to allow connected devices access to the internet. It&hellip;<\/p>\n<p class=\"more-link-p\"><a class=\"more-link\" href=\"https:\/\/www.recantha.co.uk\/blog\/?p=11130\">Read more &rarr;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[22,33],"tags":[],"class_list":["post-11130","post","type-post","status-publish","format-standard","hentry","category-geeky-techiness","category-networking"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ethical hacking experiment uses Raspberry Pi - Raspberry Pi Pod<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.recantha.co.uk\/blog\/?p=11130\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ethical hacking experiment uses Raspberry Pi - Raspberry Pi Pod\" \/>\n<meta property=\"og:description\" content=\"In June, European law enforcement agency Europol, backed by German ethical hacking company\u00a0SySS, conducted an experiment in London. The experiment involved setting a mobile Raspberry Pi unit up as a wifi\u00a0hotspot to allow connected devices access to the internet. It&hellip;Read more &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.recantha.co.uk\/blog\/?p=11130\" \/>\n<meta property=\"og:site_name\" content=\"Raspberry Pi Pod\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/recantha\/\" \/>\n<meta property=\"article:published_time\" content=\"2014-10-03T11:31:13+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/static.guim.co.uk\/sys-images\/Guardian\/Pix\/pictures\/2014\/9\/29\/1411988822003\/0be4350b-2e5b-4d78-a4fa-bf1b39ebb6e4-460x276.jpeg\" \/>\n<meta name=\"author\" content=\"Michael Horne\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@recantha\" \/>\n<meta name=\"twitter:site\" content=\"@recantha\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Horne\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=11130#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=11130\"},\"author\":{\"name\":\"Michael Horne\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/person\/c27c4ef2ee1c18b130f1fcd5dcdbb263\"},\"headline\":\"Ethical hacking experiment uses Raspberry Pi\",\"datePublished\":\"2014-10-03T11:31:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=11130\"},\"wordCount\":162,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=11130#primaryimage\"},\"thumbnailUrl\":\"http:\/\/static.guim.co.uk\/sys-images\/Guardian\/Pix\/pictures\/2014\/9\/29\/1411988822003\/0be4350b-2e5b-4d78-a4fa-bf1b39ebb6e4-460x276.jpeg\",\"articleSection\":[\"Geeky Techiness\",\"Networking\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.recantha.co.uk\/blog\/?p=11130#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=11130\",\"url\":\"https:\/\/www.recantha.co.uk\/blog\/?p=11130\",\"name\":\"Ethical hacking experiment uses Raspberry Pi - Raspberry Pi Pod\",\"isPartOf\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=11130#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=11130#primaryimage\"},\"thumbnailUrl\":\"http:\/\/static.guim.co.uk\/sys-images\/Guardian\/Pix\/pictures\/2014\/9\/29\/1411988822003\/0be4350b-2e5b-4d78-a4fa-bf1b39ebb6e4-460x276.jpeg\",\"datePublished\":\"2014-10-03T11:31:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=11130#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.recantha.co.uk\/blog\/?p=11130\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=11130#primaryimage\",\"url\":\"http:\/\/static.guim.co.uk\/sys-images\/Guardian\/Pix\/pictures\/2014\/9\/29\/1411988822003\/0be4350b-2e5b-4d78-a4fa-bf1b39ebb6e4-460x276.jpeg\",\"contentUrl\":\"http:\/\/static.guim.co.uk\/sys-images\/Guardian\/Pix\/pictures\/2014\/9\/29\/1411988822003\/0be4350b-2e5b-4d78-a4fa-bf1b39ebb6e4-460x276.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=11130#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.recantha.co.uk\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ethical hacking experiment uses Raspberry Pi\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#website\",\"url\":\"https:\/\/www.recantha.co.uk\/blog\/\",\"name\":\"Raspberry Pi Pod\",\"description\":\"Experiences with the Raspberry Pi micro computer and microcontroller\",\"publisher\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.recantha.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#organization\",\"name\":\"Raspberry Pi Pod\",\"url\":\"https:\/\/www.recantha.co.uk\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/03\/cropped-PiPod-Logo-v3.png?fit=800%2C337&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/03\/cropped-PiPod-Logo-v3.png?fit=800%2C337&ssl=1\",\"width\":800,\"height\":337,\"caption\":\"Raspberry Pi Pod\"},\"image\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/recantha\/\",\"https:\/\/x.com\/recantha\",\"https:\/\/www.linkedin.com\/in\/recantha\/\",\"https:\/\/www.youtube.com\/channel\/UCK4F9blabxzmk8Inzhs8tpg\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/person\/c27c4ef2ee1c18b130f1fcd5dcdbb263\",\"name\":\"Michael Horne\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/479778b0677caadde0ceb54c4129804ef674914607e3ed0998808148357d10d8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/479778b0677caadde0ceb54c4129804ef674914607e3ed0998808148357d10d8?s=96&d=mm&r=g\",\"caption\":\"Michael Horne\"},\"url\":\"https:\/\/www.recantha.co.uk\/blog\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ethical hacking experiment uses Raspberry Pi - Raspberry Pi Pod","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.recantha.co.uk\/blog\/?p=11130","og_locale":"en_US","og_type":"article","og_title":"Ethical hacking experiment uses Raspberry Pi - Raspberry Pi Pod","og_description":"In June, European law enforcement agency Europol, backed by German ethical hacking company\u00a0SySS, conducted an experiment in London. The experiment involved setting a mobile Raspberry Pi unit up as a wifi\u00a0hotspot to allow connected devices access to the internet. It&hellip;Read more &rarr;","og_url":"https:\/\/www.recantha.co.uk\/blog\/?p=11130","og_site_name":"Raspberry Pi Pod","article_publisher":"https:\/\/www.facebook.com\/recantha\/","article_published_time":"2014-10-03T11:31:13+00:00","og_image":[{"url":"http:\/\/static.guim.co.uk\/sys-images\/Guardian\/Pix\/pictures\/2014\/9\/29\/1411988822003\/0be4350b-2e5b-4d78-a4fa-bf1b39ebb6e4-460x276.jpeg","type":"","width":"","height":""}],"author":"Michael Horne","twitter_card":"summary_large_image","twitter_creator":"@recantha","twitter_site":"@recantha","twitter_misc":{"Written by":"Michael Horne","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.recantha.co.uk\/blog\/?p=11130#article","isPartOf":{"@id":"https:\/\/www.recantha.co.uk\/blog\/?p=11130"},"author":{"name":"Michael Horne","@id":"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/person\/c27c4ef2ee1c18b130f1fcd5dcdbb263"},"headline":"Ethical hacking experiment uses Raspberry Pi","datePublished":"2014-10-03T11:31:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.recantha.co.uk\/blog\/?p=11130"},"wordCount":162,"commentCount":0,"publisher":{"@id":"https:\/\/www.recantha.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.recantha.co.uk\/blog\/?p=11130#primaryimage"},"thumbnailUrl":"http:\/\/static.guim.co.uk\/sys-images\/Guardian\/Pix\/pictures\/2014\/9\/29\/1411988822003\/0be4350b-2e5b-4d78-a4fa-bf1b39ebb6e4-460x276.jpeg","articleSection":["Geeky Techiness","Networking"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.recantha.co.uk\/blog\/?p=11130#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.recantha.co.uk\/blog\/?p=11130","url":"https:\/\/www.recantha.co.uk\/blog\/?p=11130","name":"Ethical hacking experiment uses Raspberry Pi - Raspberry Pi Pod","isPartOf":{"@id":"https:\/\/www.recantha.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.recantha.co.uk\/blog\/?p=11130#primaryimage"},"image":{"@id":"https:\/\/www.recantha.co.uk\/blog\/?p=11130#primaryimage"},"thumbnailUrl":"http:\/\/static.guim.co.uk\/sys-images\/Guardian\/Pix\/pictures\/2014\/9\/29\/1411988822003\/0be4350b-2e5b-4d78-a4fa-bf1b39ebb6e4-460x276.jpeg","datePublished":"2014-10-03T11:31:13+00:00","breadcrumb":{"@id":"https:\/\/www.recantha.co.uk\/blog\/?p=11130#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.recantha.co.uk\/blog\/?p=11130"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.recantha.co.uk\/blog\/?p=11130#primaryimage","url":"http:\/\/static.guim.co.uk\/sys-images\/Guardian\/Pix\/pictures\/2014\/9\/29\/1411988822003\/0be4350b-2e5b-4d78-a4fa-bf1b39ebb6e4-460x276.jpeg","contentUrl":"http:\/\/static.guim.co.uk\/sys-images\/Guardian\/Pix\/pictures\/2014\/9\/29\/1411988822003\/0be4350b-2e5b-4d78-a4fa-bf1b39ebb6e4-460x276.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.recantha.co.uk\/blog\/?p=11130#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.recantha.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Ethical hacking experiment uses Raspberry Pi"}]},{"@type":"WebSite","@id":"https:\/\/www.recantha.co.uk\/blog\/#website","url":"https:\/\/www.recantha.co.uk\/blog\/","name":"Raspberry Pi Pod","description":"Experiences with the Raspberry Pi micro computer and microcontroller","publisher":{"@id":"https:\/\/www.recantha.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.recantha.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.recantha.co.uk\/blog\/#organization","name":"Raspberry Pi Pod","url":"https:\/\/www.recantha.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/03\/cropped-PiPod-Logo-v3.png?fit=800%2C337&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/03\/cropped-PiPod-Logo-v3.png?fit=800%2C337&ssl=1","width":800,"height":337,"caption":"Raspberry Pi Pod"},"image":{"@id":"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/recantha\/","https:\/\/x.com\/recantha","https:\/\/www.linkedin.com\/in\/recantha\/","https:\/\/www.youtube.com\/channel\/UCK4F9blabxzmk8Inzhs8tpg"]},{"@type":"Person","@id":"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/person\/c27c4ef2ee1c18b130f1fcd5dcdbb263","name":"Michael Horne","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/479778b0677caadde0ceb54c4129804ef674914607e3ed0998808148357d10d8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/479778b0677caadde0ceb54c4129804ef674914607e3ed0998808148357d10d8?s=96&d=mm&r=g","caption":"Michael Horne"},"url":"https:\/\/www.recantha.co.uk\/blog\/?author=1"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2RsaV-2Tw","jetpack-related-posts":[{"id":18199,"url":"https:\/\/www.recantha.co.uk\/blog\/?p=18199","url_meta":{"origin":11130,"position":0},"title":"Create an automatic failover\/switcher wifi hotspot on your Raspberry Pi","author":"Michael Horne","date":"14 February 2018","format":false,"excerpt":"Roboberry, over at Raspberry Connect, has documented a way to automatically create a wifi hotspot on your Pi if your wifi connection to your router fails, or if there is no router to connect to. This is a great idea because it means you can connect to your Pi 'on\u2026","rel":"","context":"In &quot;Networking&quot;","block_context":{"text":"Networking","link":"https:\/\/www.recantha.co.uk\/blog\/?cat=33"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2018\/02\/wifihotspotfailover.jpg?fit=400%2C429&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":10594,"url":"https:\/\/www.recantha.co.uk\/blog\/?p=10594","url_meta":{"origin":11130,"position":1},"title":"Script to create a wireless hotspot on a Raspberry Pi","author":"Michael Horne","date":"2 August 2014","format":false,"excerpt":"Simon Walters has written a nice script which automagically turns your Pi into a wireless hotspot. It only works with\u00a08188CUS-based adapters at the moment, but it's a great starting point if you want to be able to connect to your Pi wirelessly and headless at, for example, a Raspberry Jam.\u2026","rel":"","context":"In &quot;Networking&quot;","block_context":{"text":"Networking","link":"https:\/\/www.recantha.co.uk\/blog\/?cat=33"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.truconnect.com\/wp-content\/uploads\/2012\/10\/what-is-a-wifi-hotspot.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":12789,"url":"https:\/\/www.recantha.co.uk\/blog\/?p=12789","url_meta":{"origin":11130,"position":2},"title":"Create a Raspberry Pi wi-fi hotspot with the Edimax EW-7811Un dongle","author":"Michael Horne","date":"19 June 2015","format":false,"excerpt":"Many people have these lovely little dongles from Edimax. They're cheap, tiny and work very well with the Raspberry Pi. Dave Conroy has written up a method to turn your Pi into a wi-fi hotspot using one of these dongles (which uses the\u00a0RTL8188CUS chipset). This is particularly ideal if you've\u2026","rel":"","context":"In &quot;Networking&quot;","block_context":{"text":"Networking","link":"https:\/\/www.recantha.co.uk\/blog\/?cat=33"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.edimax.com\/edimax\/mw\/cufiles\/images\/products\/pics\/ew-7811un\/big\/EW-7811Un_01_1000x1000.jpg?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.edimax.com\/edimax\/mw\/cufiles\/images\/products\/pics\/ew-7811un\/big\/EW-7811Un_01_1000x1000.jpg?resize=350%2C200 1x, https:\/\/i0.wp.com\/www.edimax.com\/edimax\/mw\/cufiles\/images\/products\/pics\/ew-7811un\/big\/EW-7811Un_01_1000x1000.jpg?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.edimax.com\/edimax\/mw\/cufiles\/images\/products\/pics\/ew-7811un\/big\/EW-7811Un_01_1000x1000.jpg?resize=700%2C400 2x"},"classes":[]},{"id":11873,"url":"https:\/\/www.recantha.co.uk\/blog\/?p=11873","url_meta":{"origin":11130,"position":3},"title":"DIY Raspberry Pi VPN\/TOR Router","author":"Michael Horne","date":"30 January 2015","format":false,"excerpt":"Anonymous browsing is all the rage nowadays, what with government snooping on the increase. Well now you can set up\u00a0your Raspberry Pi as an anonymous router which shows up as a wireless hotspot which you then connect your desktop or laptop computer to over wifi. Take a look at this\u2026","rel":"","context":"In &quot;Networking&quot;","block_context":{"text":"Networking","link":"https:\/\/www.recantha.co.uk\/blog\/?cat=33"},"img":{"alt_text":"","src":"https:\/\/makezineblog.files.wordpress.com\/2015\/01\/img_20150126_144738.jpg?w=350&h=200&crop=1","width":350,"height":200,"srcset":"https:\/\/makezineblog.files.wordpress.com\/2015\/01\/img_20150126_144738.jpg?w=350&h=200&crop=1 1x, https:\/\/makezineblog.files.wordpress.com\/2015\/01\/img_20150126_144738.jpg?w=525&h=300&crop=1 1.5x, https:\/\/makezineblog.files.wordpress.com\/2015\/01\/img_20150126_144738.jpg?w=700&h=400&crop=1 2x, https:\/\/makezineblog.files.wordpress.com\/2015\/01\/img_20150126_144738.jpg?w=1050&h=600&crop=1 3x, https:\/\/makezineblog.files.wordpress.com\/2015\/01\/img_20150126_144738.jpg?w=1400&h=800&crop=1 4x"},"classes":[]},{"id":10486,"url":"https:\/\/www.recantha.co.uk\/blog\/?p=10486","url_meta":{"origin":11130,"position":4},"title":"Turn your Raspberry Pi into a wifi hotspot with an Edimax dongle","author":"Michael Horne","date":"23 July 2014","format":false,"excerpt":"I must've missed this one before. Dave Conroy has written a tutorial on turning your Pi into a wifi hotspot using the venerable Edimax EW-7811Un adapter dongle (which I reviewed here). Read the tutorial\u00a0here.","rel":"","context":"In &quot;Networking&quot;","block_context":{"text":"Networking","link":"https:\/\/www.recantha.co.uk\/blog\/?cat=33"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.daveconroy.com\/wp3\/wp-content\/uploads\/2013\/07\/edimax-dime-ss.jpg?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.daveconroy.com\/wp3\/wp-content\/uploads\/2013\/07\/edimax-dime-ss.jpg?resize=350%2C200 1x, https:\/\/i0.wp.com\/www.daveconroy.com\/wp3\/wp-content\/uploads\/2013\/07\/edimax-dime-ss.jpg?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.daveconroy.com\/wp3\/wp-content\/uploads\/2013\/07\/edimax-dime-ss.jpg?resize=700%2C400 2x"},"classes":[]},{"id":2640,"url":"https:\/\/www.recantha.co.uk\/blog\/?p=2640","url_meta":{"origin":11130,"position":5},"title":"Bartendro &#8211; a cocktail dispensing robot using the #RaspberryPi","author":"Michael Horne","date":"5 March 2013","format":false,"excerpt":"Party Robotics have launched a\u00a0Kickstarter\u00a0project to fund their cocktail-dispensing robot, the Bartendro. The Bartendro has, at it's core, a Raspberry Pi. In their effort to fulfil their goal of creating the perfect cocktail perfectly each time, they use Arduino clones (essentially) as control boards which are then linked to the\u2026","rel":"","context":"In &quot;Geeky Techiness&quot;","block_context":{"text":"Geeky Techiness","link":"https:\/\/www.recantha.co.uk\/blog\/?cat=22"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/posts\/11130","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=11130"}],"version-history":[{"count":1,"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/posts\/11130\/revisions"}],"predecessor-version":[{"id":11131,"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/posts\/11130\/revisions\/11131"}],"wp:attachment":[{"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=11130"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=11130"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=11130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}