-->

الأربعاء، 3 يونيو 2020

Whonix operating system, while using it, be sure to become like a ghost online!

Privacy no longer exists on the internet. It is true that the IP number is not the personal identity, but with the vast amount of information that users share minute by minute, it is not necessary to make a great effort to find out something about someone. At the same time, there are applications and services that do little to hide your digital identity, unless an objective and smallpox solution is applied. This solution may lie in a Linux distribution called "Whonix".

 Whonix is ​​an operating system that uses the Tor virtual network to provide a completely "anonymous" isolated environment, which means it is impossible for anyone to know who you are.

Any free software that is able to monitor open connections can help you be anonymous when connected to the internet, but some of these programs share the approximate IP number and location, which may also happen on a computer, smartphone, or tablet. In general, you have no direct control over the connections that are created, maintained or terminated, what they can share and what they cannot participate in.

The equation becomes more complicated when insecure applications appear, or always current updates to the operating system. There are many options for hiding the identity of your connection, and the Tor network is one of them, but instead of using a simple browser, why not make the entire operating system and every required connection pass through that network?

This is the goal of Whonix, an operating system formerly known as TorBOX. Whonix relies on Debian, VirtualBox and Tor network. what's the idea? Whonix includes two virtual environments: one is Tor which allows you to completely hide and prevent stalkers from tracking you, and plays the role of a "strong gateway", while the Debian platform is in a completely isolated network.

The only way that this second environment should go to the web is through the Tor access door, where you define any connection that a user can either request or the application does not take the necessary precautions to protect the user's privacy.


 The theory behind Whonix is ​​very good, however, there are some details to consider. The most important of them may be that, depending on the virtualization system, the maximum level of security Whonix can achieve is automatically related to both native environmental security and virtualization security itself such as Windows and Mac via VirtualBox, Linux via VirtualBox, KVM, or Qubes OS as a third option. For starters, it is recommended to limit everything to VirtualBox, it is the fastest and easiest.


While using this system, you can use whatever programs and servers you want and connect as you want, as you like, no one can track you, your DNS is confidential, and even if someone managed to penetrate you it will also not be able to get the original IP of your device.



ليست هناك تعليقات:

إرسال تعليق