Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality. Learn more →
HiddenVM Alternatives
Similar projects and alternatives to HiddenVM
-
Whonix
Discontinued Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP. https://www.whonix.org
-
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
-
-
BrowserBox
Install and run Firefox on Debian unattended in a virtual machine or on a computer. (by Torxgewinde)
-
mbp-tails
How to get Tails working on T2 Apple device (e.g. 2019 MacBook Pro) without needing external keyboard/mouse.
-
whoami-project
Whoami provides enhanced privacy, anonymity for Debian and Arch based linux distributions
-
bento
Packer templates for building minimal Vagrant baseboxes for multiple platforms
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
-
-
streisand
Discontinued Streisand sets up a new server running your choice of WireGuard, OpenConnect, OpenSSH, OpenVPN, Shadowsocks, sslh, Stunnel, or a Tor bridge. It also generates custom instructions for all of these services. At the end of the run you are given an HTML file with instructions that can be shared with friends, family members, and fellow activists.
-
proxychains
proxychains - a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" for SOCKS4/5, "basic" for HTTP.
-
-
HiddenVM
HiddenVM is a futuristic tool powered by KVM designed to combine the powerful amnesic nature of Tails and the impenetrable design of Whonix with the unbreakable strength of Veracrypt. (by IncognitoIceman)
-
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
HiddenVM reviews and mentions
- HiddenVM – Use any desktop OS without leaving a trace
- Digital War Against Putin -- Automated Google Reviews with Python
-
Virtualbox WITHIN Tails?
Well what a goddamn surprise. I happen to be fiddling around with the exact same thing as I'm snowed in today! Like others have said, this is not recommended if you have a serious threat model. But if you have a couple free USB sticks and like tinkering with this stuff, check out https://github.com/aforensics/HiddenVM
-
The Hitchhiker’s Guide to Online Anonymity (new draft version v0.7.8)
Added new sub-route to the TAILS route using the HiddenVM project https://github.com/aforensics/HiddenVM for providing Plausible Deniability within TAILS
-
Most Secure Host OS
As per the documentation of the HiddenVM project (see https://github.com/aforensics/HiddenVM#but-doesn-t-whonix-inside-tails-mean-tor-over-tor). The VMs won't be using TAILS Tor connectivity. So there is no network chaining. It's not Tor over Tor and the Whonix VMs will have their own classic Tor connectivity but benefiting from TAILS well implemented Amnesia on the Host. I had no important issues so far.
You could also use TAILS with HiddenVM https://github.com/aforensics/HiddenVM which is also quite secure combining both TAILS/Whonix and Veracrypt plausible deniability features if you want.
-
A note from our sponsor - InfluxDB
www.influxdata.com | 28 Mar 2024
Stats
aforensics/HiddenVM is an open source project licensed under GNU General Public License v3.0 only which is an OSI approved license.
The primary programming language of HiddenVM is Shell.