Anonabox PRO Tor & VPN Router for $89
November 1, 2016 / by Marco / Categories : Business, deals, design, entrepreneur, website


KEY FEATURES
You may have subscribed to a VPN before, but no other service delivers flexibility and internet security like the Anonabox PRO Router. PRO is the most advanced way to fortify your privacy and online anonymity by layering the Tor network with VPN services. Use both together or separately, and without needing to download software onto your devices. Small enough to fit in your pocket, this router gives you unparalleled flexibility and security.
- Browse the internet securely using Tor & VPN services in tandem or independently
- Share files more securely w/ PRO’s built-in USB port
- Leverage the VPN service to specify your IP location & unblock internet content
- Use PRO as a WiFi uplink & range extender w/ the included user interface
- Easily connect & access the deep web
- Get webserver access to (.onion hosting)
- Enhance your security w/ a customizable password within the Admin Interface
- Experience super security w/ a free 30 day trial of HideMyAss! & VyprVPN VPN services
PRODUCT SPECS
- Processor: 650 MHz NEC MIPS
- 128 MB of RAM
- Wireless type: 802.11 a/b/g/n
- Weight: 3.5 oz
- Dimensions: 2.5″ x 1.5″ x 1″
- Voltage: 5 volts
Includes:
- Anonabox PRO Router
- 30 day trial of HideMyAss! & VyprVPN VPN services
OTHER ARTICLES YOU MAY LIKE

DRILL BRUSH KIT REVIEW: OZITO 16-PIECE UNBOXED + REAL CLEANING RESULTS
Ready to put a drill-powered brush kit to the test? In this unboxing and quick clean-up, we crack open a 16-piece drill brush set, check out what each piece is for, and then try it on a stained pot to see how it performs. If you’ve ever wondered how these brush kits stack up for […]
read more
OPENSSL TUTORIAL: CREATE A PRIVATE KEY AND SSL CERTIFICATE FROM THE TERMINAL
In this guide, we’ll walk through requesting a certificate in AWS Certificate Manager (ACM), exporting it with a passphrase, decrypting the private key on a Linux server, and installing the certificate into HestiaCP. I’ll also point out exactly where each step happens with the screenshots referenced in the transcript. 1) Request a public certificate in […]
read more