SlideShare a Scribd company logo
Akshay Vasava (MA074)
Content
 Introduction
 Why WHONIX
 Structure of WHONIX
 Pros
 Cons
 Applications
 Conclusion
Are you safe?
Introduction
 WHONIX aims at preserving your privacy and anonymity
by helping you use your applications anonymously. A web
browser, IRC client, word processor and more pre-
configured with security in mind.
 It is a complete operating system designed to be used
inside a host operating system. It is Free Software and
based on Tor, <<vanilla>>Debian GNU/Linux and security by
isolation.
Why WHONIX?
Security by Isolation
 Two parts:
 Whonix Workstation – Working with applications
 Whonix Gateway – Routing via Tor
Cont…
Anonymity online through Tor
 Whonix relies on the Tor network to protect your
anonymity online
 All connections are either forced through it or blocked.
 Tor protects by bouncing communications around a
distributed network of relays run by volunteers all around
the world.
Cont…
Based on Debian
 To oversimplify it: Whonix is just a collection of
configuration files and scripts.
 Anything you can do with “vanilla” Debian GNU/Linux, you
can do with Whonix.
 Whonix doesn’t break anything and doesn’t stop you from
using anything you want.
 Ex. Installing xrandr
Structure of WHONIX
 Distributed as:
 Gateway
 Workstation
 Virtualization engine
 VirtualBox
 VM runs a check to ensure – software & date and time is up to date
Working
Cont…
 Workstation
 Connected to the gateway
 Security by isolation
 Tor artefacts – xchat,
torchat, gpg encryption,
bitcoin software etc.
 Gateway
 Routing all internet
traffic through Tor
 Not recommended to use
for anything else than a
gateway
Cont…
 User applications therefore have no knowledge of the
user’s “real” IP address, nor do they have access to any
information about the physical hardware.
 In order to obtain such information , an application would
have to find a way “break out” of VirtualBox, or to
subvert the Gateway.
Working of Tor
Cont…
 The Gateway VM
 Running Tor
 Virtual network interfaces
 One of it is connected to outside Internet on VM Host (Tor relays)
 Other connected to virtual LAN (Runs inside host)
 The Workstation VM
 Running user applications
 Internal virtual LAN communicate with Gateway
 Forces all traffic coming from workstation to pass through Tor
 Workstation VM can “see” only IP addresses on the Internal LAN
Cont…
 The web browser pre-installed in the Workstation VM is
the modified version of Mozilla Firefox provided by the
Tor as part of its Tor browser package.
 This Browser has been changed to reduce the amount of
system specific information leaked to Web servers.
Pros.
 All applications, including those, which do not support
proxy settings, will be routed through Tor
 Java / Javascript / flash / Browser Plugins /
misconfigured applications cannot leak your real external
IP
 Hide your IP address
 Prevent your ISP from spying on you
 Prevent websites from identifying you
Cont…
 Prevent malware from identifying you
 Whonix does even protect against root exploits(Malware
with root rights) on the workstation
 Best possible Protocol-Leak-Protection and
Fingerprinting-Protection
 Circumvent censorship
Cons…
 Whonix is produced independently from the Tor
anonymity software and carries no guarantee from the
Tor Project about quality, suitability or anything else.
Applications
 Anonymity
Cont…
 Privacy & Security
Conclusion
 A free and open Operating System
 An anti-censorship tool
 The first step among many in hiding your identity
 The best thing to hide your identity
 A complete operating system designed to be used inside
host operating system.
 It is free software and based on Tor, Debian GNU/Linux
and security by isolation
Footnotes/References
 https://techrepublic.com/blog/smb-technologist
 https://www.whonix.org/wiki/About
 https://www.torproject.org/about/overview.html.en
 https://anonymous-proxy-servers.net/forum
WHONIX OS

More Related Content

What's hot

IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
Abdullaziz Tagawy
 
Firewall &amp; packet filter new
Firewall &amp; packet filter newFirewall &amp; packet filter new
Firewall &amp; packet filter new
Karnav Rana
 
NETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptx
NETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptxNETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptx
NETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptx
SibenConor
 
Network Security- port security.pptx
Network Security- port security.pptxNetwork Security- port security.pptx
Network Security- port security.pptx
SulSya
 
Firewall
FirewallFirewall
Firewall
nayakslideshare
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
ssuser530a07
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
Coder Tech
 
Packet Sniffer
Packet Sniffer Packet Sniffer
Packet Sniffer
vilss
 
Network Security
Network SecurityNetwork Security
Network Security
MAJU
 
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
How Hack WiFi through Aircrack-ng in Kali Linux Cyber SecurityHow Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
Ahmad Yar
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
TayabaZahid
 
Network Penetration Testing
Network Penetration TestingNetwork Penetration Testing
Network Penetration Testing
Mohammed Adam
 
Vpn ppt
Vpn pptVpn ppt
Packet sniffers
Packet sniffers Packet sniffers
Packet sniffers
Ravi Teja Reddy
 
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
iberrywifisecurity
 
Secure shell
Secure shellSecure shell
Secure shell
Arjun Aj
 
NMAP
NMAPNMAP
OWASP Mobile Top 10
OWASP Mobile Top 10OWASP Mobile Top 10
OWASP Mobile Top 10
NowSecure
 
Wireshark - presentation
Wireshark - presentationWireshark - presentation
Wireshark - presentation
Kateryna Haskova
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
Kudzai Rerayi
 

What's hot (20)

IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
 
Firewall &amp; packet filter new
Firewall &amp; packet filter newFirewall &amp; packet filter new
Firewall &amp; packet filter new
 
NETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptx
NETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptxNETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptx
NETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptx
 
Network Security- port security.pptx
Network Security- port security.pptxNetwork Security- port security.pptx
Network Security- port security.pptx
 
Firewall
FirewallFirewall
Firewall
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Packet Sniffer
Packet Sniffer Packet Sniffer
Packet Sniffer
 
Network Security
Network SecurityNetwork Security
Network Security
 
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
How Hack WiFi through Aircrack-ng in Kali Linux Cyber SecurityHow Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Network Penetration Testing
Network Penetration TestingNetwork Penetration Testing
Network Penetration Testing
 
Vpn ppt
Vpn pptVpn ppt
Vpn ppt
 
Packet sniffers
Packet sniffers Packet sniffers
Packet sniffers
 
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
 
Secure shell
Secure shellSecure shell
Secure shell
 
NMAP
NMAPNMAP
NMAP
 
OWASP Mobile Top 10
OWASP Mobile Top 10OWASP Mobile Top 10
OWASP Mobile Top 10
 
Wireshark - presentation
Wireshark - presentationWireshark - presentation
Wireshark - presentation
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 

Viewers also liked

testing
testingtesting
testing
nychowdhury22
 
Motivational camp 2013
Motivational  camp 2013Motivational  camp 2013
Motivational camp 2013
SMK Batu Unjur
 
Itc
Itc Itc
Mymanet
MymanetMymanet
Mymanet
Akshay Vasava
 
Test
TestTest
Test
MELIAU
 
Escuel a primaria anexa
Escuel a primaria anexaEscuel a primaria anexa
Escuel a primaria anexa
Jazmin Sosa
 
My Portfolio 2013
My Portfolio 2013My Portfolio 2013
My Portfolio 2013
Satoko Hinomizu
 
N3XT
N3XTN3XT
Barclays case bs
Barclays case bsBarclays case bs
Barclays case bs
Manmohan Singh
 
Working capital management
Working capital managementWorking capital management
Working capital management
anshulbandela
 
3 D Internet
3 D Internet3 D Internet
3 D Internet
Akshay Vasava
 
Tatakelola Badan Layanan Umum Daerah (BLUD)
Tatakelola Badan Layanan Umum Daerah (BLUD)Tatakelola Badan Layanan Umum Daerah (BLUD)
Tatakelola Badan Layanan Umum Daerah (BLUD)
Marsusilanata Wawan
 
Touchless Touchscreen Technology
Touchless Touchscreen TechnologyTouchless Touchscreen Technology
Touchless Touchscreen Technology
Akshay Vasava
 

Viewers also liked (14)

testing
testingtesting
testing
 
Slide share
Slide shareSlide share
Slide share
 
Motivational camp 2013
Motivational  camp 2013Motivational  camp 2013
Motivational camp 2013
 
Itc
Itc Itc
Itc
 
Mymanet
MymanetMymanet
Mymanet
 
Test
TestTest
Test
 
Escuel a primaria anexa
Escuel a primaria anexaEscuel a primaria anexa
Escuel a primaria anexa
 
My Portfolio 2013
My Portfolio 2013My Portfolio 2013
My Portfolio 2013
 
N3XT
N3XTN3XT
N3XT
 
Barclays case bs
Barclays case bsBarclays case bs
Barclays case bs
 
Working capital management
Working capital managementWorking capital management
Working capital management
 
3 D Internet
3 D Internet3 D Internet
3 D Internet
 
Tatakelola Badan Layanan Umum Daerah (BLUD)
Tatakelola Badan Layanan Umum Daerah (BLUD)Tatakelola Badan Layanan Umum Daerah (BLUD)
Tatakelola Badan Layanan Umum Daerah (BLUD)
 
Touchless Touchscreen Technology
Touchless Touchscreen TechnologyTouchless Touchscreen Technology
Touchless Touchscreen Technology
 

Similar to WHONIX OS

FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
SakshiSolapure1
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
webhostingguy
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
webhostingguy
 
Placing backdoors-through-firewalls
Placing backdoors-through-firewallsPlacing backdoors-through-firewalls
Placing backdoors-through-firewalls
Akapo Damilola
 
Safe Computing At Home And Work
Safe Computing At Home And WorkSafe Computing At Home And Work
Safe Computing At Home And Work
John Steensen, MBA/TM, CISA, CRISC
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Abhinav Biswas
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptx
AmardeepKumar621436
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
ClubHack
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
ClubHack
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
amiable_indian
 
Network security
Network securityNetwork security
Network security
Sidiq Dwi Laksana
 
Geek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the Internet
GeekNightHyderabad
 
IoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control DesignIoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control Design
Priyanka Aash
 
Firewalls
FirewallsFirewalls
Firewalls
Deevena Dayaal
 
Firewall ppt
Firewall pptFirewall ppt
Firewall
FirewallFirewall
Advanced Internet Final
Advanced Internet FinalAdvanced Internet Final
Advanced Internet Final
mordannon
 
Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinal
mordannon
 
Firewalls
FirewallsFirewalls
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
ImXaib
 

Similar to WHONIX OS (20)

FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
 
Placing backdoors-through-firewalls
Placing backdoors-through-firewallsPlacing backdoors-through-firewalls
Placing backdoors-through-firewalls
 
Safe Computing At Home And Work
Safe Computing At Home And WorkSafe Computing At Home And Work
Safe Computing At Home And Work
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptx
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
 
Network security
Network securityNetwork security
Network security
 
Geek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the Internet
 
IoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control DesignIoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control Design
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall
FirewallFirewall
Firewall
 
Advanced Internet Final
Advanced Internet FinalAdvanced Internet Final
Advanced Internet Final
 
Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinal
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 

Recently uploaded

A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 

Recently uploaded (20)

A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 

WHONIX OS

  • 2. Content  Introduction  Why WHONIX  Structure of WHONIX  Pros  Cons  Applications  Conclusion
  • 4. Introduction  WHONIX aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processor and more pre- configured with security in mind.  It is a complete operating system designed to be used inside a host operating system. It is Free Software and based on Tor, <<vanilla>>Debian GNU/Linux and security by isolation.
  • 5. Why WHONIX? Security by Isolation  Two parts:  Whonix Workstation – Working with applications  Whonix Gateway – Routing via Tor
  • 6. Cont… Anonymity online through Tor  Whonix relies on the Tor network to protect your anonymity online  All connections are either forced through it or blocked.  Tor protects by bouncing communications around a distributed network of relays run by volunteers all around the world.
  • 7. Cont… Based on Debian  To oversimplify it: Whonix is just a collection of configuration files and scripts.  Anything you can do with “vanilla” Debian GNU/Linux, you can do with Whonix.  Whonix doesn’t break anything and doesn’t stop you from using anything you want.  Ex. Installing xrandr
  • 8. Structure of WHONIX  Distributed as:  Gateway  Workstation  Virtualization engine  VirtualBox  VM runs a check to ensure – software & date and time is up to date
  • 10. Cont…  Workstation  Connected to the gateway  Security by isolation  Tor artefacts – xchat, torchat, gpg encryption, bitcoin software etc.  Gateway  Routing all internet traffic through Tor  Not recommended to use for anything else than a gateway
  • 11. Cont…  User applications therefore have no knowledge of the user’s “real” IP address, nor do they have access to any information about the physical hardware.  In order to obtain such information , an application would have to find a way “break out” of VirtualBox, or to subvert the Gateway.
  • 12.
  • 13.
  • 15.
  • 16.
  • 17. Cont…  The Gateway VM  Running Tor  Virtual network interfaces  One of it is connected to outside Internet on VM Host (Tor relays)  Other connected to virtual LAN (Runs inside host)  The Workstation VM  Running user applications  Internal virtual LAN communicate with Gateway  Forces all traffic coming from workstation to pass through Tor  Workstation VM can “see” only IP addresses on the Internal LAN
  • 18. Cont…  The web browser pre-installed in the Workstation VM is the modified version of Mozilla Firefox provided by the Tor as part of its Tor browser package.  This Browser has been changed to reduce the amount of system specific information leaked to Web servers.
  • 19.
  • 20. Pros.  All applications, including those, which do not support proxy settings, will be routed through Tor  Java / Javascript / flash / Browser Plugins / misconfigured applications cannot leak your real external IP  Hide your IP address  Prevent your ISP from spying on you  Prevent websites from identifying you
  • 21. Cont…  Prevent malware from identifying you  Whonix does even protect against root exploits(Malware with root rights) on the workstation  Best possible Protocol-Leak-Protection and Fingerprinting-Protection  Circumvent censorship
  • 22. Cons…  Whonix is produced independently from the Tor anonymity software and carries no guarantee from the Tor Project about quality, suitability or anything else.
  • 25. Conclusion  A free and open Operating System  An anti-censorship tool  The first step among many in hiding your identity  The best thing to hide your identity  A complete operating system designed to be used inside host operating system.  It is free software and based on Tor, Debian GNU/Linux and security by isolation
  • 26. Footnotes/References  https://techrepublic.com/blog/smb-technologist  https://www.whonix.org/wiki/About  https://www.torproject.org/about/overview.html.en  https://anonymous-proxy-servers.net/forum