Whonix, which is earlier called TorBOX or aos; now been reintroduced with a new style. This time we got a complete anonymous general purpose Operating System based on Virtual Box, DebianGNU/Linux and Tor. According to the project wiki page - in Whonix IP and DNS leaks are impossible. Not even malware with root rights can find out the user's real IP/location. This is because Whonix consists of two virtual machines. One machine solely runs Tor and acts as a gateway, which we call Whonix-Gateway. The other machine, which we call Whonix-Workstation, is on a completely isolated network. Only connections through Tor are possible.
We request our reader to See Security for a more comprehensive description, security features and threat model. You can even go through with full change log and also download the source code from github.
Key Features:
Key Features:
- Adobe Flash anonymously
- browse the web anonymously
- Anonymous IRC
- Anonymous Publishing
- Anonymous E-Mail with Mozilla Thunderbird and TorBirdy
- Add a proxy behind Tor (Tor -> proxy)
- Based on Debian GNU/Linux.
- Based on the Tor anonymity network.
- Based on Virtual Box.
- Can torify almost any application.
- Can torify any operating system
- Can torify Windows.
- Chat anonymously.
- Circumvent Censorship.
- DNSSEC over Tor
- Encrypted DNS
- Full IP/DNS protocol leak protection.
- Hide the fact that you are using Tor/Whonix
- Isolating Proxy
- Java anonymously
- Javascript anonymously
- Location/IP hidden servers
- Prevents anyone from learning your IP.
- Prevents anyone from learning your physical location.
- Private obfuscated bridges supported.
- Protects your privacy.
- Protocol-Leak-Protection and Fingerprinting-Protection
- Secure And Distributed Time Synchronization Mechanism
- Security by Isolation
- Stream isolation to prevent identity correlation through circuit sharing
- Virtual Machine Images
- VPN/Tunnel Support
- Whonix is produced independently from the Tor (r) anonymity software and carries no guarantee from The Tor Project about quality, suitability or anything else.
- Transparent Proxy
- Tunnel Freenet through Tor
- Tunnel i2p through Tor
- Tunnel JonDonym through Tor
- Tunnel Proxy through Tor
- Tunnel Retroshare through Tor
- Tunnel SSH through Tor
- Tunnel UDP over Tor
- Tunnel VPN through Tor
0 komentar:
Posting Komentar