HiddenVM
Whonix
DISCONTINUED
Our great sponsors
HiddenVM | Whonix | |
---|---|---|
14 | 3 | |
2,088 | 597 | |
- | - | |
7.7 | 9.8 | |
about 1 month ago | about 2 years ago | |
Shell | Shell | |
GNU General Public License v3.0 only | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
HiddenVM
- HiddenVM – Use any desktop OS without leaving a trace
- Digital War Against Putin -- Automated Google Reviews with Python
-
Virtualbox WITHIN Tails?
Well what a goddamn surprise. I happen to be fiddling around with the exact same thing as I'm snowed in today! Like others have said, this is not recommended if you have a serious threat model. But if you have a couple free USB sticks and like tinkering with this stuff, check out https://github.com/aforensics/HiddenVM
-
The Hitchhiker’s Guide to Online Anonymity (new draft version v0.7.8)
Added new sub-route to the TAILS route using the HiddenVM project https://github.com/aforensics/HiddenVM for providing Plausible Deniability within TAILS
-
Most Secure Host OS
As per the documentation of the HiddenVM project (see https://github.com/aforensics/HiddenVM#but-doesn-t-whonix-inside-tails-mean-tor-over-tor). The VMs won't be using TAILS Tor connectivity. So there is no network chaining. It's not Tor over Tor and the Whonix VMs will have their own classic Tor connectivity but benefiting from TAILS well implemented Amnesia on the Host. I had no important issues so far.
You could also use TAILS with HiddenVM https://github.com/aforensics/HiddenVM which is also quite secure combining both TAILS/Whonix and Veracrypt plausible deniability features if you want.
Whonix
We haven't tracked posts mentioning Whonix yet.
Tracking mentions began in Dec 2020.
What are some alternatives?
ufw-docker - To fix the Docker and UFW security flaw without disabling iptables
whoami-project - Whoami provides enhanced privacy, anonymity for Debian and Arch based linux distributions
BrowserBox - Install and run Firefox on Debian unattended in a virtual machine or on a computer.
go-incognito - Go Incognito: A Guide to Security, Privacy, & Anonymity
openvpn-install - Set up your own OpenVPN server on Debian, Ubuntu, Fedora, CentOS or Arch Linux.
dohot - DoHoT: making practical use of DNS over HTTPS over Tor
mbp-tails - How to get Tails working on T2 Apple device (e.g. 2019 MacBook Pro) without needing external keyboard/mouse.
merOS-virt - Build and Interact with a Set of Virtual Machines
bento - Packer templates for building minimal Vagrant baseboxes for multiple platforms
awesome-malware-analysis - Defund the Police.
debian-cis - PCI-DSS compliant Debian 10/11/12 hardening