![]() |
Tutorial whonix install - Printable Version +- Sinisterly (https://sinister.ly) +-- Forum: Computers (https://sinister.ly/Forum-Computers) +--- Forum: Operating Systems (https://sinister.ly/Forum-Operating-Systems) +--- Thread: Tutorial whonix install (/Thread-Tutorial-whonix-install) Pages:
1
2
|
whonix install - encrypted - 05-05-2016 Whonix is a desktop operating system designed for advanced security and privacy. It realistically addresses attacks while maintaining usability. It makes online anonymity possible via fail-safe, automatic, and desktop-wide use of the Tor network. A heavily reconfigured Debian base is run inside multiple virtual machines, providing a substantial layer of protection from malware and IP leaks. Pre-installed, pre-configure applications are ready for use, and installing additional applications or personalizing the desktop will in no way jeopardize the user. Whonix is the only actively developed OS designed to be run inside a VM and paired with Tor. This is how it looks on paper ![]() Whonix benefits anyone who does sensitive work on their desktop or online. This includes: • Investigators and whistleblowers whose work threatens the powerful. ◦ Within an isolated environment, research and evidence can be gathered without accidental exposure. • Researchers, government officials, or businesspeople who may be targets of espionage. ◦ Anti-malware and anti-exploit modificaitons lower the threat of trojans and backdoors. • Journalists who endanger themselves and their families by reporting on organized crime. ◦ Compartmentalized, anonymous internet use prevents identity correlation between social media (and other) logins. • Political activists under targeted surveillance and attack. ◦ The usefulness of threatening the ISP in order to analyze a target's internet use will be severely limited. The cost of targeting a Whonix user is greatly increased. • Average computer users in a repressive or censored environment. ◦ Easy Tor setup (and options for advanced setups) gives users in repressive countries full internet access desktop-wide, not just in their browser. • Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved, and analyzed. ◦ Whonix does not silently upload identifying information in the background. You can find download links for the gateway and the workstations for Virtual box below Gateway Workstation Once you have both the Gateway and the Workstation downloaded you are ready to import them into Virtual box. Open up virtual box and click on file then import appliance. Once you do this go through the process and DO NOT change anything just continue through and use everything as default. Do this for both the gateway and the workstation. Now if you have trouble with the simple install you can also use this video below which is directly from the whonix site. Now this video is a download as well so don't be alarmed. Video install Once everything is install both the Gateway and the Workstation boot both of them up by double clicking the gateway and then the workstation. Please let me know if you have any issues etc and also let me know what you think about this Distro. For added security you can run a vpn on your host machine before connecting to the gateway and workstation. This will add a second/third layer of encryption to your connection but will also slow you down a little bit more. RE: whonix install - Pirate - 05-05-2016 So this is basically installing it on a VirtualBox. Why not just install it on Actual Computer or USB? RE: whonix install - encrypted - 05-05-2016 (05-05-2016, 01:52 AM)Pirate Wrote: So this is basically installing it on a VirtualBox. Only connections through Tor are possible. With Whonix, you can use applications and run servers anonymously over the internet. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP. Just like how tails is not made to be installed on a pc and is only setup to run as a live boot. RE: whonix install - Pirate - 05-05-2016 (05-05-2016, 01:57 AM)encrypted Wrote: Only connections through Tor are possible. With Whonix, you can use applications and run servers anonymously over the internet. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP.Makes sense. I wouldn't install Tails over original OS RE: whonix install - Astroz - 05-06-2016 Thanks for the help but I'd like to see it on a USB as well RE: whonix install - encrypted - 05-06-2016 (05-06-2016, 07:59 PM)Astroz Wrote: Thanks for the help but I'd like to see it on a USB as well It's doable. I just didn't write one up because I don't use it that way. RE: whonix install - Dozy Van - 05-14-2016 (05-05-2016, 01:26 AM)encrypted Wrote: It makes online anonymity possible via fail-safe, automatic, and desktop-wide use of the Tor network. Well there be the hole in your security. Anyone who tries to argue that Tor is still secure is so far as I can tell completely wrong (I am very open to correction on this if someone can cite a study to change my point of view). I have heard quite a bit of talk floating around that the NSA own up to 51% of the Tor Nodes. Please note I can't find a reference for this and you should take it with a grain of salt. But basically when using Tor your more actively watched than when not using Tor. Especially now with all the Isis stuff going on. Interesting reading: http://www.ohmygodel.com/publications/usersrouted-ccs13.pdf RE: whonix install - -nameless - 05-14-2016 (05-14-2016, 01:13 AM)Dozy Van Wrote: Well there be the hole in your security. Anyone who tries to argue that Tor is still secure is so far as I can tell completely wrong (I am very open to correction on this if someone can cite a study to change my point of view). I have heard quite a bit of talk floating around that the NSA own up to 51% of the Tor Nodes. Please note I can't find a reference for this and you should take it with a grain of salt. But basically when using Tor your more actively watched than when not using Tor. Especially now with all the Isis stuff going on. Not only this, but Tor is vulnerable as hell in general. Also yeah, nodes are monitored, and any nodes that aren't being monitored can be packeted so that any systems routing through the non-monitored nodes end up re-routing through the monitored nodes and... ya we all know what happens after that. Basically the whole Tor system is fucked. If somebody wants to monitor you on Tor, they will. Also, your ISP can tell when you're using Tor, based on your activity. If law enforcement even have the slightest hint that you're using Tor, they'll take interest in you. RE: whonix install - encrypted - 05-14-2016 I use tor and a vpn literally 24 hours of the day everyday. Also if your that worried don't connect to your home network. My whonix pc has never been on my home network. Ever. RE: whonix install - -nameless - 05-14-2016 (05-14-2016, 06:03 AM)encrypted Wrote: I use tor and a vpn literally 24 hours of the day everyday. Out of pure curiosity, which VPN do you use? And as a reply to your second point, I was referring to Tor in general, not just whonix. But what do you mean, it's never connected to your home network? Care to elaborate? |