Browse Code Get Updates. Get project updates , sponsored content from our select partners, and more. Full Name. Phone Number. Job Title. Company Size Company Size: 1 - 25 26 - 99 - - 1, - 4, 5, - 9, 10, - 19, 20, or More. Get notifications on updates for this project. Get the SourceForge newsletter. JavaScript is required for this form. No, thanks. Windows Mac Linux. Based on the Tor anonymity network.
Based on Virtual Box. Can torify almost any application. Can torify any operating system Can torify Windows. Chat anonymously. Circumvent Censorship. Prevents anyone from learning your physical location. Extensive Documentation The more you know, the safer you can be. Virus Protection Whonix provides additional security hardening measures and user education to provide better protection from viruses.
Console Lockdown Console Lockdown disables legacy login methods for improved security hardening. History Protecting our users against Real World Attacks for around a decade.
Complete respect for privacy Whonix respects data privacy principles. Warrant Canary A canary confirms that no warrants have ever been served on the Whonix project. Based on Debian In oversimplified terms, Whonix is just a collection of configuration files and scripts. Complete user freedom There are no artificial restrictions imposed on possible system configurations. Digitally signed releases Downloads are signed so genuine Whonix releases can be verified.
Research and Implementation Project Whonix makes modest claims and is wary of overconfidence. Upcoming Security Enhancements. Hardened Malloc is a hardened memory allocator which can be used with many applications to increase security. A fork by Kicksecure will be enabled by default. Each application runs as its own user, in a bubblewrap sandbox and confined by AppArmor. Untrusted Root User. Enforce kernel module software signature verification. Deactivate malware after reboot from non-root compromise.
Hardened Linux Kernel. Post-quantum cryptography resistant signing of releases. Mount Options Hardening. Multiple boot modes for better security user, live, secureadmin and superadmin. The only thing to put them off is the performance. Things like I2P-Bote are really unique. The differences in security between user models is due primarily to two factors: i the amount of user activity and ii the destination addresses and ports. Creating many streams increases the number of opportunities to choose malicious relays, and thus the speed at which that occurs, while connecting to destinations that are disallowed by many exits increases the chance that a selected exit relay will be malicious.
I have no idea. Tor will reuse the same circuit for new TCP streams for 10 minutes, as long as the circuit is working fine. If the circuit fails, Tor will switch to a new circuit immediately. But note that a single TCP stream e. Otherwise an adversary with a partial view of the network would be given many chances over time to link you to your destination, rather than just one chance.
0コメント