Available WHONIX 16, distribution to ensure anonymous communications

took place Release Distribution WHONIX 16 , aimed at providing guaranteed anonymity, security and protection of private information. WHONIX boot images formed to start running the hypervisor KVM . Build for VirtualBox and for use in the Qubes delayed (while the test assemblies of WHONIX 16 continue to be supplied). Project operation distributed under the GPLv3 license.

Distribution is based on Debian GNU / Linux and uses Tor to provide anonymity. WHONIX feature is the distribution of the distribution to two separately installed components – WHONIX-Gateway with the implementation of the network gateway for anonymous communications and the WHONIX-Workstation with the desktop. Both components are supplied within one boot image. Entering the WHONIX-Workstation environment is made only through the WHONIX-Gateway gateway, which isolates the working environment from direct interaction with the outside world and allows us to use only fictitious network addresses. Such an approach allows you to protect the user from leakage of a real IP address in the event of a hacking of a web browser and even during the use of vulnerability that gives the root access to the system.

Hacking the Whonix-Workstation will allow the attacker to obtain only fictitious network parameters, since the real IP and DNS parameters are hidden abroad of the network gateway, which directs traffic only through TOR. It should be borne in mind that WHONIX components are designed for launch in the form of guest systems, i.e. The possibility of operation of critical 0-day vulnerabilities in virtualization platforms, which can provide access to the host system are not excluded. In this regard, it is not recommended to run WHONIX-workstation on the same computer as WHONIX-Gateway.

In the Whonix-Workstation, the default XFCE user environment is provided. The delivery includes such Programs , like VLC, Tor Browser (Firefox), Thunderbird + Torbirdy, Pidgin, etc. In the delivery of the WHONIX-Gateway, you can find a set of server applications, including Apache HTTPD, NGNIX and IRC servers that can be used to organize the work of hidden TOR services. It is possible to break over the Tor tunnels for FreeNet, I2P, JONDONYM, SSH and VPN. WHONIX comparison with Tails, Tor Browser, Qubes OS Torvm and Corridor can be found on this page . If you wish, the user can only cost the Whonix-Gateway and connect their usual systems through it, including Windows, which makes it possible to provide an anonymous output for worker stations.


Main changes:

/Media reports.