Login Register






Thread Rating:
  • 0 Vote(s) - 0 Average


Tutorial whonix install filter_list
Author
Message
whonix install #1
Whonix is a desktop operating system designed for advanced security and privacy. It realistically addresses attacks while maintaining usability. It makes online anonymity possible via fail-safe, automatic, and desktop-wide use of the Tor network. A heavily reconfigured Debian base is run inside multiple virtual machines, providing a substantial layer of protection from malware and IP leaks. Pre-installed, pre-configure applications are ready for use, and installing additional applications or personalizing the desktop will in no way jeopardize the user. Whonix is the only actively developed OS designed to be run inside a VM and paired with Tor.

This is how it looks on paper
[Image: DhI23zl.jpg]

Whonix benefits anyone who does sensitive work on their desktop or online. This includes:
• Investigators and whistleblowers whose work threatens the powerful. ◦ Within an isolated environment, research and evidence can be gathered without accidental exposure.

• Researchers, government officials, or businesspeople who may be targets of espionage. ◦ Anti-malware and anti-exploit modificaitons lower the threat of trojans and backdoors.

• Journalists who endanger themselves and their families by reporting on organized crime. ◦ Compartmentalized, anonymous internet use prevents identity correlation between social media (and other) logins.

• Political activists under targeted surveillance and attack. ◦ The usefulness of threatening the ISP in order to analyze a target's internet use will be severely limited. The cost of targeting a Whonix user is greatly increased.

• Average computer users in a repressive or censored environment. ◦ Easy Tor setup (and options for advanced setups) gives users in repressive countries full internet access desktop-wide, not just in their browser.

• Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved, and analyzed. ◦ Whonix does not silently upload identifying information in the background.

You can find download links for the gateway and the workstations for Virtual box below

Gateway

Workstation


Once you have both the Gateway and the Workstation downloaded you are ready to import them into Virtual box.

Open up virtual box and click on file then import appliance.

Once you do this go through the process and DO NOT change anything just continue through and use everything as default.

Do this for both the gateway and the workstation.


Now if you have trouble with the simple install you can also use this video below which is directly from the whonix site. Now this video is a download as well so don't be alarmed.

Video install


Once everything is install both the Gateway and the Workstation boot both of them up by double clicking the gateway and then the workstation.

Please let me know if you have any issues etc and also let me know what you think about this Distro.

For added security you can run a vpn on your host machine before connecting to the gateway and workstation. This will add a second/third layer of encryption to your connection but will also slow you down a little bit more.





Your mind is programmable, if your not programming your mind, someone else will program it for you.

Reply

RE: whonix install #2
So this is basically installing it on a VirtualBox.
Why not just install it on Actual Computer or USB?
Whoop Whoop?

Reply

RE: whonix install #3
(05-05-2016, 01:52 AM)Pirate Wrote: So this is basically installing it on a VirtualBox.
Why not just install it on Actual Computer or USB?

Only connections through Tor are possible. With Whonix, you can use applications and run servers anonymously over the internet. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP.



Just like how tails is not made to be installed on a pc and is only setup to run as a live boot.





Your mind is programmable, if your not programming your mind, someone else will program it for you.

Reply

RE: whonix install #4
(05-05-2016, 01:57 AM)encrypted Wrote: Only connections through Tor are possible. With Whonix, you can use applications and run servers anonymously over the internet. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP.



Just like how tails is not made to be installed on a pc and is only setup to run as a live boot.
Makes sense. I wouldn't install Tails over original OS
Whoop Whoop?

Reply

RE: whonix install #5
Thanks for the help but I'd like to see it on a USB as well

Reply

RE: whonix install #6
(05-06-2016, 07:59 PM)Astroz Wrote: Thanks for the help but I'd like to see it on a USB as well

It's doable. I just didn't write one up because I don't use it that way.





Your mind is programmable, if your not programming your mind, someone else will program it for you.

Reply

RE: whonix install #7
(05-05-2016, 01:26 AM)encrypted Wrote: It makes online anonymity possible via fail-safe, automatic, and desktop-wide use of the Tor network.

Well there be the hole in your security. Anyone who tries to argue that Tor is still secure is so far as I can tell completely wrong (I am very open to correction on this if someone can cite a study to change my point of view). I have heard quite a bit of talk floating around that the NSA own up to 51% of the Tor Nodes. Please note I can't find a reference for this and you should take it with a grain of salt. But basically when using Tor your more actively watched than when not using Tor. Especially now with all the Isis stuff going on.


Interesting reading: http://www.ohmygodel.com/publications/us...-ccs13.pdf

Reply

RE: whonix install #8
(05-14-2016, 01:13 AM)Dozy Van Wrote: Well there be the hole in your security. Anyone who tries to argue that Tor is still secure is so far as I can tell completely wrong (I am very open to correction on this if someone can cite a study to change my point of view). I have heard quite a bit of talk floating around that the NSA own up to 51% of the Tor Nodes. Please note I can't find a reference for this and you should take it with a grain of salt. But basically when using Tor your more actively watched than when not using Tor. Especially now with all the Isis stuff going on.


Interesting reading: http://www.ohmygodel.com/publications/us...-ccs13.pdf

Not only this, but Tor is vulnerable as hell in general. Also yeah, nodes are monitored, and any nodes that aren't being monitored can be packeted so that any systems routing through the non-monitored nodes end up re-routing through the monitored nodes and... ya we all know what happens after that. Basically the whole Tor system is fucked. If somebody wants to monitor you on Tor, they will.
Also, your ISP can tell when you're using Tor, based on your activity. If law enforcement even have the slightest hint that you're using Tor, they'll take interest in you.
nameless@jabber.se
for hire, programming/sysadmin

Reply

RE: whonix install #9
I use tor and a vpn literally 24 hours of the day everyday.

Also if your that worried don't connect to your home network. My whonix pc has never been on my home network. Ever.
(This post was last modified: 05-14-2016, 06:06 AM by encrypted.)





Your mind is programmable, if your not programming your mind, someone else will program it for you.

Reply

RE: whonix install #10
(05-14-2016, 06:03 AM)encrypted Wrote: I use tor and a vpn literally 24 hours of the day everyday.

Also if your that worried don't connect to your home network. My whonix pc has never been on my home network. Ever.

Out of pure curiosity, which VPN do you use?
And as a reply to your second point, I was referring to Tor in general, not just whonix. But what do you mean, it's never connected to your home network? Care to elaborate?
nameless@jabber.se
for hire, programming/sysadmin

Reply







Users browsing this thread: 1 Guest(s)