Forwarded from Treble GSI's | Privacy + Secure
Encrypt your data
You need to securely protect your data. One of the best tools for it is VeraCrypt. It's simple, easy to install, you just have to come up with a strong password and not store it digitally.
My laptop hard drive has been encrypted for years: I enter a password every time that can neither be recovered nor reset.
VeraCrypt is used by hackers, investigators, journalists and anyone else who deals with important data. So far, not a single intelligence agency in the world has managed to decipher VeraCrypt algorithms.
#security #windows #linux #mac
You need to securely protect your data. One of the best tools for it is VeraCrypt. It's simple, easy to install, you just have to come up with a strong password and not store it digitally.
My laptop hard drive has been encrypted for years: I enter a password every time that can neither be recovered nor reset.
VeraCrypt is used by hackers, investigators, journalists and anyone else who deals with important data. So far, not a single intelligence agency in the world has managed to decipher VeraCrypt algorithms.
#security #windows #linux #mac
Forwarded from Treble GSI's | Privacy + Secure
Send Messages, Not Metadata
Your correspondence can be read in almost all messengers. The exception is Telegram, but it is not completely anonymous - it requires you to enter your phone number to register. If it comes up, you will be easily identified.
Session is an end-to-end encrypted messenger that minimises sensitive metadata, designed and built for people who want absolute privacy and freedom from any form of surveillance. It does not ask for an email or π± number when you register, but assigns you an ID - a set of hundreds of characters. It looks like a long nickname that you can share with your interlocutor to start a chat.
The app looks like a normal messenger - you can send documents, voice messages, there are groups, but it's completely anonymous. The company has no servers, the routing goes through users - it means that leaks of personal data are simply impossible.
Available on iPhone, Android and PC.
Use it!
#security
Your correspondence can be read in almost all messengers. The exception is Telegram, but it is not completely anonymous - it requires you to enter your phone number to register. If it comes up, you will be easily identified.
Session is an end-to-end encrypted messenger that minimises sensitive metadata, designed and built for people who want absolute privacy and freedom from any form of surveillance. It does not ask for an email or π± number when you register, but assigns you an ID - a set of hundreds of characters. It looks like a long nickname that you can share with your interlocutor to start a chat.
The app looks like a normal messenger - you can send documents, voice messages, there are groups, but it's completely anonymous. The company has no servers, the routing goes through users - it means that leaks of personal data are simply impossible.
Available on iPhone, Android and PC.
Use it!
#security
Forwarded from Treble GSI's | Privacy + Secure
How to Turn Off/On All Sensors on Android Phone With a Tap
While Android offers quick toggles to disable location tracking and cellular connectivity, thereβs no direct option to switch off the rest of your phoneβs sensors. For example, gyroscope can use to intercept sensitive information like passwords, account names from your π±. Luckily, Android has a hidden setting that lets you shut off all your phoneβs sensors in a single tap.
β Go to Settings > About phone > and tap build number 7 times to enable Developer Options.
β In Settings, go to System > Advanced > and tap on Developer Options.
β Scroll down and tap on Quick settings developer tiles.
β Now, tap on Sensors off toggle to add the tile on the Quick Settings panel.
β Now, to on and off sensors, pull down the Quick Settings panel, and tap on the Sensors off tile.
#security #android
While Android offers quick toggles to disable location tracking and cellular connectivity, thereβs no direct option to switch off the rest of your phoneβs sensors. For example, gyroscope can use to intercept sensitive information like passwords, account names from your π±. Luckily, Android has a hidden setting that lets you shut off all your phoneβs sensors in a single tap.
β Go to Settings > About phone > and tap build number 7 times to enable Developer Options.
β In Settings, go to System > Advanced > and tap on Developer Options.
β Scroll down and tap on Quick settings developer tiles.
β Now, tap on Sensors off toggle to add the tile on the Quick Settings panel.
β Now, to on and off sensors, pull down the Quick Settings panel, and tap on the Sensors off tile.
#security #android
Forwarded from Treble GSI's | Privacy + Secure
Find and track the IP address of any person
Grabify IP Logger can give you advanced and detailed statistical data and metadata for all clicks on your links. Your IP Logger link can access information about userβs IP address, location tracker (country, city) and so on.
The service works with just 3 simple steps:
βοΈ Shorten long link.
βοΈ Share the short link with another user.
βοΈ Grab IP address after the user clicks on your short link.
Be attantive: you can also be a target of such actions βοΈBe careful opening links!
#service #security
Grabify IP Logger can give you advanced and detailed statistical data and metadata for all clicks on your links. Your IP Logger link can access information about userβs IP address, location tracker (country, city) and so on.
The service works with just 3 simple steps:
βοΈ Shorten long link.
βοΈ Share the short link with another user.
βοΈ Grab IP address after the user clicks on your short link.
Be attantive: you can also be a target of such actions βοΈBe careful opening links!
#service #security
Forwarded from Treble GSI's | Privacy + Secure
Checking APK files for viruses
There is a small chance to stumble on dangerous applications even in PlayMarket , and if you download from other sources, this risk increases tenfold.
Therefore, you should take care of your security in advance. MetaDefender Cloud will help.
It is a free scanner that runs the file through the databases of 40 anti-viruses simultaneously. All you have to do is attach a file, its hash, its IP address, or a link to a suspicious site - and click "Process".
In just a few seconds the service will scan the entire file and show the results of each antivirus scan and also the metadata and rights of the application β .
#security
There is a small chance to stumble on dangerous applications even in PlayMarket , and if you download from other sources, this risk increases tenfold.
Therefore, you should take care of your security in advance. MetaDefender Cloud will help.
It is a free scanner that runs the file through the databases of 40 anti-viruses simultaneously. All you have to do is attach a file, its hash, its IP address, or a link to a suspicious site - and click "Process".
In just a few seconds the service will scan the entire file and show the results of each antivirus scan and also the metadata and rights of the application β .
#security
Forwarded from Treble GSI's | Privacy + Secure
Swap geolocation in your browser
It's very useful feature that will allow you to keep at least a little more personal privacy.
Location Guard will keep your location private in your browser. You give it access to your location, and it controls what resources end up getting. And what they get is not what you actually have.
This kind of dispersion of your location is available at several different levels on an incremental basis. The extension is available for Chrome, Edge and Firefox.
#security
It's very useful feature that will allow you to keep at least a little more personal privacy.
Location Guard will keep your location private in your browser. You give it access to your location, and it controls what resources end up getting. And what they get is not what you actually have.
This kind of dispersion of your location is available at several different levels on an incremental basis. The extension is available for Chrome, Edge and Firefox.
#security
Forwarded from Treble GSI's | Privacy + Secure
Stop sites from tracking the links you visit
There is a tracking mechanism that is triggered when a person clicks on various links and hyperlinks. Since you are now aware of it, you may want to protect yourself.
Ping Blocker is a browser extension that prevents sites from tracking the links you visit through hyperlink auditing.
The extension is also available for Edge and Firefox.
#security #github #addon #chrome #firefox #edge
There is a tracking mechanism that is triggered when a person clicks on various links and hyperlinks. Since you are now aware of it, you may want to protect yourself.
Ping Blocker is a browser extension that prevents sites from tracking the links you visit through hyperlink auditing.
The extension is also available for Edge and Firefox.
#security #github #addon #chrome #firefox #edge
Forwarded from π½πΌπ½π π’ππ¦ | ππ’π¦π¦, ππΆπ³π², π π²πΊπ²π (BaraΩ΄)
KeePassDX
KeePassDX, an Android password manager, securely manages your passwords. Store all your passwords in one database, locked with a master key and/or a keyfile. and fill in the forms in a secure way.
π Links:
- Downloads: GitHub | GooglePlay
- Features
- Screenshots
- Source code
- Developer: kunzisoft
π· Tags: #android #passwordmanager #security
KeePassDX, an Android password manager, securely manages your passwords. Store all your passwords in one database, locked with a master key and/or a keyfile. and fill in the forms in a secure way.
π Links:
- Downloads: GitHub | GooglePlay
- Features
- Screenshots
- Source code
- Developer: kunzisoft
π· Tags: #android #passwordmanager #security
Forwarded from Libreware
A post from the developer of #WireGuard on the severe #security flaws and lack of trustworthiness of #FDroid:
https://bsky.app/profile/grapheneos.org/post/3lgq7wqwzpk26
The Bluesky link has GrapheneOS posts explaining
https://gitlab.com/fdroid/fdroiddata/-/issues/3110#note_1613430404
Stuff here but not to the point like the Bluesky link
https://discuss.grapheneos.org/d/18731-f-droid-vulnerability-allows-bypassing-certificate-pinning/
https://bsky.app/profile/grapheneos.org/post/3lgq7wqwzpk26
The Bluesky link has GrapheneOS posts explaining
https://gitlab.com/fdroid/fdroiddata/-/issues/3110#note_1613430404
Stuff here but not to the point like the Bluesky link
https://discuss.grapheneos.org/d/18731-f-droid-vulnerability-allows-bypassing-certificate-pinning/
Bluesky Social
GrapheneOS (@grapheneos.org)
A post from the developer of WireGuard on the severe security flaws and lack of trustworthiness of F-Droid:
https://gitlab.com/fdroid/fdroiddata/-/issues/3110#note_1613430404
https://gitlab.com/fdroid/fdroiddata/-/issues/3110#note_1613430404
Forwarded from π½πΌπ½π π’ππ¦ | ππ’π¦π¦, ππΆπ³π², π π²πΊπ²π (Γmer)
Stratum
A free open-source two factor authentication app for Android. It features encrypted backups, icons, categories and a high level of customisation. It also has a Wear OS companion app.
π Links:
- Download
- Screenshots
- Features
- Source code
Developer: jamie-mh
β₯οΈ Special thanks to @felixng198 for recommending!
π·οΈ Tags: #Android #Security #Tools
A free open-source two factor authentication app for Android. It features encrypted backups, icons, categories and a high level of customisation. It also has a Wear OS companion app.
π Links:
- Download
- Screenshots
- Features
- Source code
Developer: jamie-mh
β₯οΈ Special thanks to @felixng198 for recommending!
π·οΈ Tags: #Android #Security #Tools
Forwarded from π½πΌπ½π π’ππ¦ | ππ’π¦π¦, ππΆπ³π², π π²πΊπ²π (Γmer)
OpenAPK is a curated repository of open-source Android application and games, updated weekly. it offers users enhanced privacy, improved security, and greater control by providing transparent and customisable apps options. Developers can list their open-source apps to reach a broader audience of FOSS enthusiasts
π Links:
- Website
- Screenshots
- Features
- Source code
Developer: gdimoff
βοΈ Friendly reminder:
π· Tags: #Website #Android #OpenSource #Privacy #Security #Utilities
π Links:
- Website
- Screenshots
- Features
- Source code
Developer: gdimoff
βοΈ Friendly reminder:
If you find it useful, You may star the repo, donate to the developer, or perhaps you may also contribute to the development of this project.
π· Tags: #Website #Android #OpenSource #Privacy #Security #Utilities
Forwarded from π½πΌπ½π π’ππ¦ | ππ’π¦π¦, ππΆπ³π², π π²πΊπ²π (Γmer)
Sentinel Lens β Facial Recognition Surveillance App
Sentinel Lens is a facial recognition surveillance app that sends Telegram alerts when unauthorized individuals are detected, based on a configurable blacklist and whitelist.
π Links:
- Download
- Screenshots
- Features
- Source code
Developer: dev-diaries41
π· Tags: #Android #Security #Tools
Sentinel Lens is a facial recognition surveillance app that sends Telegram alerts when unauthorized individuals are detected, based on a configurable blacklist and whitelist.
π Links:
- Download
- Screenshots
- Features
- Source code
Developer: dev-diaries41
β€οΈ Support the Project
If this project makes your life easier, here are a few quick ways to show some love:
β Star the repo/app
β Buy a coffee for the developer
π Contribute code, issues, or pull-requests
π· Tags: #Android #Security #Tools
Forwarded from Free Software[Android]
AstraCrypt
A powerful encryption app to keep your data safe and secure.
AstraCrypt is a free and open-source tool for encrypting your files with modern security standards, offering a user-friendly interface to manage them.
Strong Encryption: Utilizes AES-256 (GCM) for robust file encryption.
File Management: Offers basic file operations within the encrypted space.
Secure & Private: No data is collected, and there are no trackers or ads.
Modern UI: Features a clean and intuitive Material You design.
Download: https://apt.izzysoft.de/fdroid/index/apk/com.nevidimka655.astracrypt
Source: https://github.com/gromif/AstraCrypt
#AstraCrypt #Encryption #Security #Privacy
@foss_Android
A powerful encryption app to keep your data safe and secure.
AstraCrypt is a free and open-source tool for encrypting your files with modern security standards, offering a user-friendly interface to manage them.
Strong Encryption: Utilizes AES-256 (GCM) for robust file encryption.
File Management: Offers basic file operations within the encrypted space.
Secure & Private: No data is collected, and there are no trackers or ads.
Modern UI: Features a clean and intuitive Material You design.
Download: https://apt.izzysoft.de/fdroid/index/apk/com.nevidimka655.astracrypt
Source: https://github.com/gromif/AstraCrypt
#AstraCrypt #Encryption #Security #Privacy
@foss_Android
Forwarded from π½πΌπ½π π’ππ¦ | ππ’π¦π¦, ππΆπ³π², π π²πΊπ²π (Γmer)
AppLock
AppLock is a modern, open-source Android app locker designed to protect your privacy and sensitive data. Lock any app, prevent unauthorized access, and enjoy a seamless Material You experience. No root required.
π Links:
- Download
- Screenshots
- Features
- Source code
Developer: invoke (PranavPurwar)
π« Special thanks to @prem12321kumar for recommending!
π·οΈ Tags: #Android #Privacy #Security
AppLock is a modern, open-source Android app locker designed to protect your privacy and sensitive data. Lock any app, prevent unauthorized access, and enjoy a seamless Material You experience. No root required.
π Links:
- Download
- Screenshots
- Features
- Source code
Developer: invoke (PranavPurwar)
π« Special thanks to @prem12321kumar for recommending!
β€οΈ Support the Project
If this project makes your life easier, here are a few quick ways to show some love:
β Star the repo/app
β Buy a coffee for the developer
π Contribute code, issues, or pull-requests
π·οΈ Tags: #Android #Privacy #Security
Forwarded from 0β’Bytesβ’1
Hello, my Sonys and Cheshire Cats! πβ¨πββ¬
Today we're going to talk about 6GπΆ
6G, or the sixth generation of mobile networks. If 5G gave us fast internet andmyths about killer towers, then 6G will raise the barπ‘
Imagine data transfer speeds of up to 100 Gbps β that's hundreds of times faster than 5G! 6G will integrate AI, terahertz waves, and satellites. Standards are already being developed (thanks, 3GPP!), and the first commercial networks are expected by 2030. Europe, with its telecom giants Nokia and Ericsson, is actively participating in the race, but the US (with FutureG and DARPA projects) and China (with Huawei) are not far behindπ§©
6G operates on terahertz waves β frequencies ranging from 100 GHz to 10 THz, which transmit data so fast that 5G nervously smokes on the sidelines.
But there is one small nuance:it doesn't work well in practice, as these waves don't pass through walls very wellπ, so dense networks with lots of small antennas (massive MIMO) are needed. Traffic and security management is handled by AI, which distributes the data. Quantum encryption is also used to protect communications. 6G also has blockchain, which is needed for transparency: blockchain records who uses the network and how. Satellites are connected to provide coverage in remote areas, and RIS (smart reflective surfaces) technology helps direct signals where walls interfere.
But, as you can imagine, it's not all sunshine and rainbows, and 6G has a huge attack surface that is currently being actively studiedπ
For example, there are current threats related to the growing number of connected devices. 6G promises to connect a multitude of IoT devices. Each such device is a potential entry point for attackers. Hack one sensor in the power grid and the city is without power. Add to this the use of terahertz frequencies, which transmit data quickly but are vulnerable to local interception or jamming due to their limited range. Another headache is artificial intelligence: attackers can feed it fake data, and it will start directing traffic to nowhere. Quantum computers (still a long way off) could destroy cryptography, such as RSA, to smithereens. Don't forget the risks associated with decentralization. Processing data at the edge of the network, close to devices, reduces latency but makes these nodes an easy target for attacks, especially if they are not sufficiently protected. Attacks on the supply chain, such as the introduction of hardware Trojans, also pose a serious threat, given the complexity of manufacturing 6G equipment. Finally, scenarios such as digital twin spoofing or interference with robots can have certain consequences.
But there is no shortage of protection β developers are already coming up with ways to deal with threatsπ‘
They are creating cryptography that can withstand quantum attacks. Post-quantum cryptography uses complex mathematical problems to keep data secure (although some algorithms could use some refinement against conventional threats ). Quantum key distribution makes encryption unbreakable; any attempt at interception is immediately noticeable. For devices such as IoT sensors, encryption algorithms are being developed that do not require powerful hardware.
AI also helps: it searches for suspicious behavior in real time, checks data, and blocks attacks. Blockchain removes weak links, and smart contracts automatically control access, reducing the risk of errors. For terahertz waves, jamming technologies are used to prevent signal interception. Devices receive unique βfingerprintsβ so that they cannot be counterfeited.
Personally, I am still a little skeptical about 6G:
If you want to learn more about 6G architecture, its security, check the archive, which contains articles that will help you learn moreβ€οΈπ
#6g #attacks #Blockchain #network #neural_networks #quantum_computer #security
Today we're going to talk about 6GπΆ
6G, or the sixth generation of mobile networks. If 5G gave us fast internet and
Imagine data transfer speeds of up to 100 Gbps β that's hundreds of times faster than 5G! 6G will integrate AI, terahertz waves, and satellites. Standards are already being developed (thanks, 3GPP!), and the first commercial networks are expected by 2030. Europe, with its telecom giants Nokia and Ericsson, is actively participating in the race, but the US (with FutureG and DARPA projects) and China (with Huawei) are not far behindπ§©
6G operates on terahertz waves β frequencies ranging from 100 GHz to 10 THz, which transmit data so fast that 5G nervously smokes on the sidelines.
But there is one small nuance:
But, as you can imagine, it's not all sunshine and rainbows, and 6G has a huge attack surface that is currently being actively studiedπ
For example, there are current threats related to the growing number of connected devices. 6G promises to connect a multitude of IoT devices. Each such device is a potential entry point for attackers. Hack one sensor in the power grid and the city is without power. Add to this the use of terahertz frequencies, which transmit data quickly but are vulnerable to local interception or jamming due to their limited range. Another headache is artificial intelligence: attackers can feed it fake data, and it will start directing traffic to nowhere. Quantum computers (still a long way off) could destroy cryptography, such as RSA, to smithereens. Don't forget the risks associated with decentralization. Processing data at the edge of the network, close to devices, reduces latency but makes these nodes an easy target for attacks, especially if they are not sufficiently protected. Attacks on the supply chain, such as the introduction of hardware Trojans, also pose a serious threat, given the complexity of manufacturing 6G equipment. Finally, scenarios such as digital twin spoofing or interference with robots can have certain consequences.
But there is no shortage of protection β developers are already coming up with ways to deal with threats
They are creating cryptography that can withstand quantum attacks. Post-quantum cryptography uses complex mathematical problems to keep data secure (
AI also helps: it searches for suspicious behavior in real time, checks data, and blocks attacks. Blockchain removes weak links, and smart contracts automatically control access, reducing the risk of errors. For terahertz waves, jamming technologies are used to prevent signal interception. Devices receive unique βfingerprintsβ so that they cannot be counterfeited.
Personally, I am still a little skeptical about 6G:
it seems to me that they want to cram a bunch of hyped technologies into it that may not work as intended in practice. But it seems that this technology is being actively developed, so let's see what happens nextπIf you want to learn more about 6G architecture, its security, check the archive, which contains articles that will help you learn moreβ€οΈπ
#6g #attacks #Blockchain #network #neural_networks #quantum_computer #security
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from 0β’Bytesβ’1
6g.zip
10.7 MB
Π Π°ΡΡ
ΠΈΠ²Π΅ Π΅ΡΡΡ ΡΡΠ°ΡΡΠΈ ΠΏΡΠΎ Π°ΡΡ
ΠΊΡΠΈΠΊΡΡΡ 6g, ΠΏΡΠΎ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΡΠ΅ Π°ΡΠ°ΠΊΠΈ Π½Π° Π½Π΅Π³ΠΎ, Π° ΡΠ°ΠΊ ΠΆΠ΅ ΠΏΡΠΎ ΠΌΠ΅ΡΡ Π·Π°ΡΠΈΡΡ. ΠΠ°Π΄Π΅ΡΡΡ Π²Π°ΠΌ Π±ΡΠ΄Π΅Ρ ΠΏΠΎΠ»Π΅Π·Π½ΠΎ πΆβ€οΈβπ₯
In the archive there are articles about the 6g archktikuru, about possible attacks on it, as well as defense measures. I hope you will find it useful πΆβ€οΈβπ₯
#6g #attacks #Blockchain #network #neural_networks #quantum_computer #security #phishing #protection #post_quantum
In the archive there are articles about the 6g archktikuru, about possible attacks on it, as well as defense measures. I hope you will find it useful πΆβ€οΈβπ₯
#6g #attacks #Blockchain #network #neural_networks #quantum_computer #security #phishing #protection #post_quantum
Forwarded from 0β’Bytesβ’1
Welcome to my Alice tea party! π«π
I decided to write a series of short posts about secure operating systems π₯π§
Today, we'll take a look at Whonix and find out if it's as good and anonymous as people say.Spoiler alert: no, it's not.
Let me clarify right away: Whonix is not a full-fledged operating system, but a tool for anonymity that can work independently or as a router in Qubes OS. In this article, I will focus on analyzing how it works as a standalone system
How does Whonix work?π§©
Whonix is built on two virtual machines: Whonix-Gateway and Whonix-Workstation. Gateway configures and routes all your traffic through the Tor network. Workstation is your workplace. If you want to dig deeper, check out their documentation.
Problems with Whonix π
Now to the point: why Whonix isn't really necessary. Let's start with Gateway. It's just Debian with Tor pre-installed and a bunch of scripts that redirect traffic through Tor. Everything is tied to the configuration in the settings file and iptables rules. Cool? Not really. Plus, Whonix drags along old Debian, where packages are updated once in a blue moon.
Whonix positions itself as super protection against leaks, but if you don't understand what you're doing, no virtual machine will save you. For example, if you run a browser with JavaScript or download files and then open them outside of Workstation, your anonymity is gone.
By the way, Whonix can only be run without problems on VirtualBox. You may argue that there are versions for KVM/QEMU on their website. But that's where the problems begin. If you take Whonix for KVM, you won't be able to install it just like that β you need to edit the configuration, and there are no detailed instructions on how to do this anywhere. With VirtualBox, however, there are no such problems β everything works out of the box.
But what's wrong with VirtualBox?πͺ€
Besides the fact that it is significantly slower than KVM. In March 2025, a vulnerability CVE-2025-30712 with a rating of 8.1 appeared in Virtualbox. It allows an attacker with access to the host system to perform a VM escape, i.e., to get out of the virtual machine onto your main computerπ« . Proof-of-concept is already circulating on the network, and exploitation is easier than it seems. If the host is compromised, all your anonymity goes down the drain, and your real IP or other data may leak.
How to make an analogue of Whunix Gateway? βοΈ
But there is another way. The Gateway model itself is not bad. But you can create a machine with it yourself without Whunix, using a minimalist Linux (such as Gentoo or even FreeBSD instead of Linux). Then configure Tor directly. After all, Gateway is just a wrapper around the standard Tor and iptables settings, which can be found on Google in five minutes. Now add the iptables you found and DNSPort to the Tor config so that DNS requests also go through Tor, and that's it. This takes up less space and reduces the attack surface.
Conclusion
To be fair, Whonix isn't always bad. But it can be useful in conjunction with Qubes OS (where it runs in KVM, by the way), which has additional security mechanisms, such as domain isolation, that enhance security. But apart from Qubes, Whonix is pretty pointless. You might think it's suitable for those who don't want to bother with configuring Tor, but that's not the case. To run Whonix on a decent VM, such as KVM, you'll have to go through just as much trouble.
The bottom line is simple: Whonix is not a super-anonymous OS, but a tool that complicates life more than it protects itπ
I hope you found this useful.β€οΈβ¨ If you wish, you can explore the topic yourself by reading research and testing the system.
Here are some good articles about Whonix:
THESIS.pdf β here is an overview of anonymous operating systems, including Whonix.
Whonix and Tor Limitations β about the shortcomings of Whonix and Tor.
JOSH Article β analysis of Whonix limitations.
#anonymity #linux #whunix #cve #anonymity_os #tor #security
I decided to write a series of short posts about secure operating systems π₯
Today, we'll take a look at Whonix and find out if it's as good and anonymous as people say.
Let me clarify right away: Whonix is not a full-fledged operating system, but a tool for anonymity that can work independently or as a router in Qubes OS. In this article, I will focus on analyzing how it works as a standalone system
How does Whonix work?π§©
Whonix is built on two virtual machines: Whonix-Gateway and Whonix-Workstation. Gateway configures and routes all your traffic through the Tor network. Workstation is your workplace. If you want to dig deeper, check out their documentation.
Problems with Whonix π
Now to the point: why Whonix isn't really necessary. Let's start with Gateway. It's just Debian with Tor pre-installed and a bunch of scripts that redirect traffic through Tor. Everything is tied to the configuration in the settings file and iptables rules. Cool? Not really. Plus, Whonix drags along old Debian, where packages are updated once in a blue moon.
Whonix positions itself as super protection against leaks, but if you don't understand what you're doing, no virtual machine will save you. For example, if you run a browser with JavaScript or download files and then open them outside of Workstation, your anonymity is gone.
By the way, Whonix can only be run without problems on VirtualBox. You may argue that there are versions for KVM/QEMU on their website. But that's where the problems begin. If you take Whonix for KVM, you won't be able to install it just like that β you need to edit the configuration, and there are no detailed instructions on how to do this anywhere. With VirtualBox, however, there are no such problems β everything works out of the box.
But what's wrong with VirtualBox?πͺ€
Besides the fact that it is significantly slower than KVM. In March 2025, a vulnerability CVE-2025-30712 with a rating of 8.1 appeared in Virtualbox. It allows an attacker with access to the host system to perform a VM escape, i.e., to get out of the virtual machine onto your main computerπ« . Proof-of-concept is already circulating on the network, and exploitation is easier than it seems. If the host is compromised, all your anonymity goes down the drain, and your real IP or other data may leak.
How to make an analogue of Whunix Gateway? βοΈ
But there is another way. The Gateway model itself is not bad. But you can create a machine with it yourself without Whunix, using a minimalist Linux (such as Gentoo or even FreeBSD instead of Linux). Then configure Tor directly. After all, Gateway is just a wrapper around the standard Tor and iptables settings, which can be found on Google in five minutes. Now add the iptables you found and DNSPort to the Tor config so that DNS requests also go through Tor, and that's it. This takes up less space and reduces the attack surface.
Conclusion
To be fair, Whonix isn't always bad. But it can be useful in conjunction with Qubes OS (where it runs in KVM, by the way), which has additional security mechanisms, such as domain isolation, that enhance security. But apart from Qubes, Whonix is pretty pointless. You might think it's suitable for those who don't want to bother with configuring Tor, but that's not the case. To run Whonix on a decent VM, such as KVM, you'll have to go through just as much trouble.
The bottom line is simple: Whonix is not a super-anonymous OS, but a tool that complicates life more than it protects it
I hope you found this useful.β€οΈβ¨ If you wish, you can explore the topic yourself by reading research and testing the system.
Here are some good articles about Whonix:
THESIS.pdf β here is an overview of anonymous operating systems, including Whonix.
Whonix and Tor Limitations β about the shortcomings of Whonix and Tor.
JOSH Article β analysis of Whonix limitations.
#anonymity #linux #whunix #cve #anonymity_os #tor #security
Please open Telegram to view this post
VIEW IN TELEGRAM
Whonix
Whonix Documentation
A Crash Course in Anonymity and Security on the Internet.
Hello, my Mad Hatter friends! π©
Let me ask you a question: have you ever wondered how Monero's security works and whether it is as reliable as they say?πͺ
In my new article, I figured this out and also explained how to further protect yourself so that your transactions remain invisible even to the most curious eyes.π‘
I describe in detail how Monero works, how resistant it is to attacks, and what measures will help you maintain your anonymity. π
The article covers attacks ranging from Black Marble Flooding to Eclipse Attacks, and I also share practical tips on how to run your own node and configure Tor to increase your privacy.
I hope you will find it interesting to delve into this topic. π§© At the end of the article, there are links to additional materials so that you can explore this topic in more depth if you wish. βοΈ
Enjoy your tea! βοΈπ©·
English version:
#Monero #XMR #cryptography #privacy #blockchain #ring_signatures #stealth_addresses #RingCT #Tor #I2P #crypto_wallet #security #anonymity #decentralization #Kovri #FCMP #crypto_protection
Let me ask you a question: have you ever wondered how Monero's security works and whether it is as reliable as they say?πͺ
In my new article, I figured this out and also explained how to further protect yourself so that your transactions remain invisible even to the most curious eyes.π‘
I describe in detail how Monero works, how resistant it is to attacks, and what measures will help you maintain your anonymity. π
The article covers attacks ranging from Black Marble Flooding to Eclipse Attacks, and I also share practical tips on how to run your own node and configure Tor to increase your privacy.
I hope you will find it interesting to delve into this topic. π§© At the end of the article, there are links to additional materials so that you can explore this topic in more depth if you wish. βοΈ
Enjoy your tea! βοΈπ©·
English version:
#Monero #XMR #cryptography #privacy #blockchain #ring_signatures #stealth_addresses #RingCT #Tor #I2P #crypto_wallet #security #anonymity #decentralization #Kovri #FCMP #crypto_protection
Forwarded from π½πΌπ½π π’ππ¦ | ππ’π¦π¦, ππΆπ³π², π π²πΊπ²π (Γmer)
Just Delete Me
Just Delete Me maps out the account deletion procedures for many platforms and provides a directory with instructions on how to request the deletion of your data from them.
π Links:
- Download
- Screenshots
- Website
- Source code
Developer: Amano LLC
π· Tags: #Website #Android #Security #Tools
Just Delete Me maps out the account deletion procedures for many platforms and provides a directory with instructions on how to request the deletion of your data from them.
π Links:
- Download
- Screenshots
- Website
- Source code
Developer: Amano LLC
β€οΈ Support the Project
If this project makes your life easier, here are a few quick ways to show some love:
β Star the repo/app
β Buy a coffee for the developer
π Contribute code, issues, or pull-requests
π· Tags: #Website #Android #Security #Tools