HiddenVM
mbp-tails
Our great sponsors
HiddenVM | mbp-tails | |
---|---|---|
13 | 3 | |
1,432 | 8 | |
- | - | |
7.5 | 0.0 | |
11 days ago | about 1 year ago | |
Shell | ||
GNU General Public License v3.0 only | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
HiddenVM
- Digital War Against Putin -- Automated Google Reviews with Python
-
Virtualbox WITHIN Tails?
Well what a goddamn surprise. I happen to be fiddling around with the exact same thing as I'm snowed in today! Like others have said, this is not recommended if you have a serious threat model. But if you have a couple free USB sticks and like tinkering with this stuff, check out https://github.com/aforensics/HiddenVM
-
The Hitchhiker’s Guide to Online Anonymity (new draft version v0.7.8)
Added new sub-route to the TAILS route using the HiddenVM project https://github.com/aforensics/HiddenVM for providing Plausible Deniability within TAILS
-
Most Secure Host OS
As per the documentation of the HiddenVM project (see https://github.com/aforensics/HiddenVM#but-doesn-t-whonix-inside-tails-mean-tor-over-tor). The VMs won't be using TAILS Tor connectivity. So there is no network chaining. It's not Tor over Tor and the Whonix VMs will have their own classic Tor connectivity but benefiting from TAILS well implemented Amnesia on the Host. I had no important issues so far.
You could also use TAILS with HiddenVM https://github.com/aforensics/HiddenVM which is also quite secure combining both TAILS/Whonix and Veracrypt plausible deniability features if you want.
mbp-tails
-
How to make Tails work on 2019 16-inch MacBook Pro (T2) without external keyboard or mouse!
Here are the instructions if you think it's safe for you: https://github.com/T2minator/mbp-tails
What are some alternatives?
Whonix - Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP. https://www.whonix.org
go-incognito - Go Incognito: A Guide to Security, Privacy, & Anonymity
Unshaky - A software attempt to address the "double key press" issue on Apple's butterfly keyboard [not actively maintained]
BrowserBox - Install and run Firefox on Debian unattended in a virtual machine or on a computer.
dohot - DoHoT: making practical use of DNS over HTTPS over Tor
vagrant-boxes - The scripts that build my Vagrant base boxes.
merOS-virt - Build and Interact with a Set of Virtual Machines
awesome-malware-analysis - Defund the Police.
bento - Packer templates for building minimal Vagrant baseboxes for multiple platforms
whoami-project - Whoami provides enhanced privacy, anonymity for Debian and Arch based linux distributions
vagrant-projects - Vagrant projects for Oracle products and other examples
thgtoa