Ask me anything        RSS    SEARCH

================================================================================

Black Cat Hacks

================================================================================

( A lot of hacking is playing with other people, you know, getting them to do strange things. But things aren't always #000000 and #FFFFFF )

================================================================================

================================================================================

10/14/2012 07:06:00

WHONIX OS


Whonix (called TorBOX or aos in past) is an anonymous general purpose operating system based on Virtual Box, Debian GNU/Linux and Tor.


By Whonix design, IP and DNS leaks are impossible. Not even malware with root rights can find out the user’s real IP/location.

This is because Whonix consists of two (virtual) machines. One machine solely runs Tor and acts as a gateway, which we call Whonix-Gateway. The other machine, which we call Whonix-Workstation, is on a completely isolated network. Only connections through Tor are possible.

Whonix is produced independently from the Tor (r) anonymity software and carries no guarantee from The Tor Project about quality, suitability or anything else. Due to trademark issues the project was renamed to Whonix.

The project homepage with a full project description, threat model and documentation, build instructions can be found here:

Whonix Wiki

Features

  • Adobe Flash anonymously
  • browse the web anonymously
  • Anonymous IRC
  • Anonymous Publishing
  • Anonymous E-Mail with Mozilla Thunderbird and TorBirdy
  • Add a proxy behind Tor (Tor -> proxy)
  • Based on Debian GNU/Linux.
  • Based on the Tor anonymity network.
  • Based on Virtual Box.
  • Can torify almost any application.
  • Can torify any operating system
  • Can torify Windows.
  • Chat anonymously.
  • Circumvent Censorship.
  • DNSSEC over Tor
  • Encrypted DNS
  • Full IP/DNS protocol leak protection.
  • Hide the fact that you are using Tor/Whonix
  • Isolating Proxy
  • Java anonymously
  • Javascript anonymously
  • Location/IP hidden servers
  • Prevents anyone from learning your IP.
  • Prevents anyone from learning your physical location.
  • Private obfuscated bridges supported.
  • Protects your privacy.
  • Protocol-Leak-Protection and Fingerprinting-Protection
  • Secure And Distributed Time Synchronization Mechanism
  • Security by Isolation
  • Stream isolation to prevent identity correlation through circuit sharing
  • Virtual Machine Images
  • VPN/Tunnel Support
  • Whonix is produced independently from the Tor (r) anonymity software and carries no guarantee from The Tor Project about quality, suitability or anything else.
  • Transparent Proxy
  • Tunnel Freenet through Tor
  • Tunnel i2p through Tor
  • Tunnel JonDonym through Tor
  • Tunnel Proxy through Tor
  • Tunnel Retroshare through Tor
  • Tunnel SSH through Tor
  • Tunnel UDP over Tor
  • Tunnel VPN through Tor

--------------------------------------------------------------------------------

08/04/2012 17:43:05


A System Is Only Secure When Nobody Has Total Control — Caleb James DeLisle

A System Is Only Secure When Nobody Has Total Control — Caleb James DeLisle

(Source: guerrillatech)

--------------------------------------------------------------------------------

07/21/2012 18:02:08

How to secure your computer and surf fully Anonymous BLACK-HAT STYLE

Anonymous AntiSec

The ultimate guide for anonymous and secure Internet usage.

Online

PDF

--------------------------------------------------------------------------------

pg 1 of 2

================================================================================

Designed: Robert Boylan