Login Register






Thread Rating:
  • 0 Vote(s) - 0 Average


Whonix Install filter_list
Author
Message
Whonix Install #1
Whonix is a desktop operating system designed for advanced security and privacy. It realistically addresses attacks while maintaining usability. It makes online anonymity possible via fail-safe, automatic, and desktop-wide use of the Tor network. A heavily reconfigured Debian base is run inside multiple virtual machines, providing a substantial layer of protection from malware and IP leaks. Pre-installed applications, pre-configured with safe defaults are ready for use. Additionally, installing custom applications or personalizing the desktop will in no way jeopardize the user. Whonix is the only actively developed OS designed to be run inside a VM and paired with Tor.

Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call Whonix-Gateway. The other, which we call Whonix-Workstation, is on a completely isolated network. Only connections through Tor are possible. With Whonix, you can use applications and run servers anonymously over the internet. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP.

To install you must fist download and install virtualbox.
for linux you can use
Code:
sudo apt-get install virtualbox linux-headers-$(uname -r)
for windows/mac use the link https://www.virtualbox.org/wiki/Downloads

once dowloaded and installed you can then go ahead and download the Whonix gateway and the Whonix Workstation from the links below.

https://www.whonix.org/download/13.0.0.1....0.1.1.ova
https://www.whonix.org/download/13.0.0.1....0.1.1.ova

Now open up Virtual box and import the gateway and leave all the default settings alone.

Do the same with the workstation.

Once both are imported and your ready to open up the OS begin by opening up the gateway FIRST and letting it fully boot up until you see connected to TOR

THAN boot up the workstation. Once both are running do all your browsing etc from the WorkStation and just keep the gateway running in the background.

From here you can use the TOR browser installer on the DESKTOP of the workstation for your browser.

You can also setup icedove for email and use a email provider who has a tor hidden service for PGP email running through TOR.

I can upload pictures later and help anyone if they need assistance installing and running this OS.





Your mind is programmable, if your not programming your mind, someone else will program it for you.

Reply

RE: Whonix Install #2
I have an interesting way of anonymity.
I have a laptop with the wrong region + timezone set up, then I run a VPN, not through the system itself, but through a connected router running OpenWRT. I can run whatever I like on the laptop, but it cannot escape the VLAN of the router or send traffic through anything but the VPN.

This is an interesting concept, though Smile

Reply

RE: Whonix Install #3
Why use this over something more known such as Tails, or a custom configuration?

If i were going for anonymity/privacy i'd probably use tails or configure something myself on a laptop solely for this purpose (as I've done in the past)

Essentially what i'm asking is what advantages does Whonix have
[Image: pBD38Xq.png]
Email: insidious@protonmail.ch

Reply

RE: Whonix Install #4
(08-06-2016, 02:22 AM)insidious15 Wrote: Why use this over something more known such as Tails, or a custom configuration?

>implying "more known" makes something better

Whonix is better for advanced users by a long shot, if you're an average Joe then there's nothing wrong with Tails.

Reply

RE: Whonix Install #5
(08-06-2016, 02:22 AM)insidious15 Wrote: Why use this over something more known such as Tails, or a custom configuration?

If i were going for anonymity/privacy i'd probably use tails or configure something myself on a laptop solely for this purpose (as I've done in the past)

Essentially what i'm asking is what advantages does Whonix have

Whonix is VM optimized, at least. Tails isn't.

Reply

RE: Whonix Install #6
(08-05-2016, 03:06 PM)Axari Wrote: I have an interesting way of anonymity.
I have a laptop with the wrong region + timezone set up, then I run a VPN, not through the system itself, but through a connected router running OpenWRT. I can run whatever I like on the laptop, but it cannot escape the VLAN of the router or send traffic through anything but the VPN.

Interesting way of anonymity? There is no difference between doing what you said and just using a VPN on your laptop that has a kill switch. The only difference between the two is in the case that your laptop gets infected, your real IP won't be showing; even then, you could still be deanonymized by any personally identifiable information stored on your laptop. The only real perk of having a VPN on your router is the fact that all devices on your network's traffic will be encrypted and your real IP will be hidden on them; the only device you mentioned was a laptop though.

Reply

RE: Whonix Install #7
(08-06-2016, 04:55 AM)meow Wrote:
(08-05-2016, 03:06 PM)Axari Wrote: I have an interesting way of anonymity.
I have a laptop with the wrong region + timezone set up, then I run a VPN, not through the system itself, but through a connected router running OpenWRT. I can run whatever I like on the laptop, but it cannot escape the VLAN of the router or send traffic through anything but the VPN.

Interesting way of anonymity? There is no difference between doing what you said and just using a VPN on your laptop that has a kill switch. The only difference between the two is in the case that your laptop gets infected, your real IP won't be showing; even then, you could still be deanonymized by any personally identifiable information stored on your laptop. The only real perk of having a VPN on your router is the fact that all devices on your network's traffic will be encrypted and your real IP will be hidden on them; the only device you mentioned was a laptop though.

I should elaborate.
The router is only connected to my actual router and the laptop in question. The laptop is configured with an aged, plausible identity. You say that the only perk is that even if the laptop was infected, the real IP couldn't be leaked, and yes, this was by design. The laptop serves no purpose other than to be infected with RATs and other skid junk. They get it all wrong, even though they would otherwise be fully convinced they have administrator access on "my" laptop. You may ask, why not a VM? Well, I figured a low end physical machine would be much better since there are clever VM detection methods, which I would rather not try to circumvent.

Reply

RE: Whonix Install #8
(08-06-2016, 05:11 AM)Axari Wrote:
(08-06-2016, 04:55 AM)meow Wrote:
(08-05-2016, 03:06 PM)Axari Wrote: I have an interesting way of anonymity.
I have a laptop with the wrong region + timezone set up, then I run a VPN, not through the system itself, but through a connected router running OpenWRT. I can run whatever I like on the laptop, but it cannot escape the VLAN of the router or send traffic through anything but the VPN.

Interesting way of anonymity? There is no difference between doing what you said and just using a VPN on your laptop that has a kill switch. The only difference between the two is in the case that your laptop gets infected, your real IP won't be showing; even then, you could still be deanonymized by any personally identifiable information stored on your laptop. The only real perk of having a VPN on your router is the fact that all devices on your network's traffic will be encrypted and your real IP will be hidden on them; the only device you mentioned was a laptop though.

I should elaborate.
The router is only connected to my actual router and the laptop in question. The laptop is configured with an aged, plausible identity. You say that the only perk is that even if the laptop was infected, the real IP couldn't be leaked, and yes, this was by design. The laptop serves no purpose other than to be infected with RATs and other skid junk. They get it all wrong, even though they would otherwise be fully convinced they have administrator access on "my" laptop. You may ask, why not a VM? Well, I figured a low end physical machine would be much better since there are clever VM detection methods, which I would rather not try to circumvent.

Ah, nice. I was just confused since you left out quite a bit of information lol, I thought the sole reason you were doing that was to make sure your IP didn't get leaked, which is what made me post what I did since there are many more efficient ways to do that without having to buy another router.

Reply

RE: Whonix Install #9
(08-06-2016, 05:27 PM)meow Wrote:
(08-06-2016, 05:11 AM)Axari Wrote:
(08-06-2016, 04:55 AM)meow Wrote: Interesting way of anonymity? There is no difference between doing what you said and just using a VPN on your laptop that has a kill switch. The only difference between the two is in the case that your laptop gets infected, your real IP won't be showing; even then, you could still be deanonymized by any personally identifiable information stored on your laptop. The only real perk of having a VPN on your router is the fact that all devices on your network's traffic will be encrypted and your real IP will be hidden on them; the only device you mentioned was a laptop though.

I should elaborate.
The router is only connected to my actual router and the laptop in question. The laptop is configured with an aged, plausible identity. You say that the only perk is that even if the laptop was infected, the real IP couldn't be leaked, and yes, this was by design. The laptop serves no purpose other than to be infected with RATs and other skid junk. They get it all wrong, even though they would otherwise be fully convinced they have administrator access on "my" laptop. You may ask, why not a VM? Well, I figured a low end physical machine would be much better since there are clever VM detection methods, which I would rather not try to circumvent.

Ah, nice. I was just confused since you left out quite a bit of information lol, I thought the sole reason you were doing that was to make sure your IP didn't get leaked, which is what made me post what I did since there are many more efficient ways to do that without having to buy another router.

My fault, I should have been more clear from the start Smile

Reply

RE: Whonix Install #10
Tails isnt meant for everyday use like a typical OS.

Were as whonix can be run to do daily things and keep you protected.

Everything inside whonix is optimized to not leak anything. They test everything before release and made sure it is optimized for anonymity.

If you install something not in the release then your risking that unless your sure its safe as well.

Also running a VPN on your main os then booting into whonix could be beneficial as well but i haven't really dug into that as much. But if that can encrypt your traffic before whonix plus that encryption you can probably also stack a second VPN inside the whonix distro if you wanted.
the more the marrier right?
(This post was last modified: 08-12-2016, 05:17 PM by rm -rf /.)

Reply







Users browsing this thread: 2 Guest(s)