lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 31 Oct 2012 14:43:13 +0000
From: adrelanos <adrelanos@...eup.net>
To: full-disclosure@...ts.grok.org.uk
Subject: Whonix ALPHA 0.4.5 - Anonymous Operating System
	released

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Hi everyone,

Whonix ALPHA 0.4.5 is now out.

Whonix (called TorBOX or aos in past) is an anonymous general purpose
operating system based on Virtual Box, Debian GNU/Linux and Tor. By
Whonix design, IP and DNS leaks are impossible. Not even malware with
root rights can find out the user's real IP/location.

This is because Whonix consists of two (virtual) machines. One machine
solely runs Tor and acts as a gateway, which we call Whonix-Gateway.
The other machine, which we call Whonix-Workstation, is on a
completely isolated network. Only connections through Tor are possible.

This is only a very brief introduction. See Security [1] for a more
comprehensive description, security features and threat model.

Whonix is produced independently from the Tor (r) anonymity software
and carries no guarantee from The Tor Project about quality,
suitability or anything else.

Screenshots:

  https://sourceforge.net/p/whonix/wiki/Screenshots/

Highlights:

  Applications: Can torify almost any application safely. [13] [14]

  Bridges: (Private) (obfuscated) bridges can be used the same way
they could be used with vanilla Tor. [12]

  VPN/Tunnel Support: combining Whonix with VPNs, proxies or ssh in
any combination is possible. [11]

  Hidden Service Support: You can provide any kind of hidden service
with a greatly reduced risk for IP leaks. [10]

  Windows Support: Whonix-Gateway can also torify Microsoft Windows or
any other operating system. [9]

  Flash Support: Although recommend against Flash, people point
Mozilla Firefox, Flash and socksifier at their feet and pull the
trigger. Whonix is currently the safest method to use Adobe Flash. [15]

Homepage with documentation:

  https://sourceforge.net/p/whonix/wiki/Home/

Or a shorter homepage url:

  http://whonix.sf.net

Call for help:

  Please test and leave feedback. Since I am currently the only person
developing Whonix, I could need some help.

General content anonymity caution note:

  Whonix uses the best of both worlds, the Isolating Proxy concept [2]
and the Transparent Proxy concept. At the moment there are no known
anonymity leaks or proxy bypass problems. The principal design is less
vulnerable for any kind of leaks. At time of writing (October 2012) I
have been working on the theoretical concept and practical
implementation for 9 months, the basics have been developed by (at
least) three people, adrelanos, smarm and anonymous. [1] [2]

  Although Whonix has been developed with greatest care, a negative,
being leak free or being free form mistakes in the extended project
description [1], can not be proven. This is Whonix's first release
announcement. I hope skilled people look into the concept and
implementation and fail to find anonymity related bugs.

Download link:

  Virtual Machine images for Virtual Box (.ova) can be downloaded from
sourceforge.

  https://sourceforge.net/p/whonix/wiki/Download/

Changelog:

  https://sourceforge.net/p/whonix/wiki/Changelog/

The GnuPG signature that signed this email is also the same key that
signs the Whonix sha512 hash files. You can find my gpg key here. [5]
[6] [7] [8]

Thanks:

  Thanks to the many people who either directly or indirectly
contributed to this project. Thanks to the Free Software community,
the people who write papers and documentation, the Tor developers, the
Tails developers, the Virtual Box developers, upstream developers,
Debian/Ubuntu GNU/Linux developers, Whonix contributors, testers,
people active on mailing lists and so on. Without them, Whonix
wouldn't be possible!

Footnotes:

  [1] https://sourceforge.net/p/whonix/wiki/Security/
  [2]
https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/IsolatingProxy
  [3]
https://trac.torproject.org/projects/tor/wiki/doc/TorBOX?action=history
  [4] https://trac.torproject.org/projects/tor/wiki/doc/TorBOX?version=1
  [5] https://github.com/adrelanos/Whonix
  [6] http://whonix.sourceforge.net/adrelanos
  [7] http://su6ephfi7dtxnbtb.onion/
  [8] https://trac.torproject.org/projects/tor/wiki/doc/proper
  [9] https://sourceforge.net/p/whonix/wiki/OtherOperatingSystems/
  [10]
https://sourceforge.net/p/whonix/wiki/OptionalConfigurations/#hosting-hidden-services
  [11]
https://sourceforge.net/p/whonix/wiki/OptionalConfigurations/#vpn-tunnel-support
  [12]
https://sourceforge.net/p/whonix/wiki/OptionalConfigurations/#using-private-obfuscated-bridges
  [13]
https://sourceforge.net/p/whonix/wiki/Security/#whonixs-protocol-leak-protection-and-fingerprinting-protection
  [14]
http://sourceforge.net/p/whonix/wiki/Applications/#identity-correlation-through-circuit-sharing
  [15] https://sourceforge.net/p/whonix/wiki/Applications/#browser-plugins

Cheers,
adrelanos
-----BEGIN PGP SIGNATURE-----
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=0Ygb
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ