France’s browser-based website blocking proposal will set a disastrous precedent for the open internet –Mozzila Blog
"In a well-intentioned yet dangerous move to fight online fraud, France is on the verge of forcing browsers to create a dystopian technical capability. It would force browser providers to create the means to mandatorily block websites present on a government provided list. Such a move will overturn decades of established content moderation norms and provide a playbook for authoritarian governments"
#censorship
#france #browser #cybersecurity #mozilla #security #surveillance
"In a well-intentioned yet dangerous move to fight online fraud, France is on the verge of forcing browsers to create a dystopian technical capability. It would force browser providers to create the means to mandatorily block websites present on a government provided list. Such a move will overturn decades of established content moderation norms and provide a playbook for authoritarian governments"
#censorship
#france #browser #cybersecurity #mozilla #security #surveillance
Open Policy & Advocacy
France’s browser-based website blocking proposal will set a disastrous precedent for the open internet
Article 6 (para II and III) of the SREN Bill would force providers to create the means to mandatorily block websites on a government provided list encoded into the browser.
itsecbot@schleuss.online -
Android 14 to let you block connections to unencrypted cellular networks - Google has announced new cellular security features for its upcoming Android 14, expected...
#security #google #mobile #Cellular #Android #IMSI
Android 14 to let you block connections to unencrypted cellular networks - Google has announced new cellular security features for its upcoming Android 14, expected...
#security #google #mobile #Cellular #Android #IMSI
BleepingComputer
Android 14 to let you block connections to unencrypted cellular networks
Google has announced new cellular security features for its upcoming Android 14, expected later this month, that aim to protect business data and communications.
itnewsbot@schleuss.online - WinRAR 0-day that uses poisoned JPG and TXT files under exploit since April - Enlarge (credit: Getty Images)
A newly discovered zeroday in t... - https://arstechnica.com/?p=1962625 #vulnerability #security #zipfiles #exploit #zeroday #biz #winrar
A newly discovered zeroday in t... - https://arstechnica.com/?p=1962625 #vulnerability #security #zipfiles #exploit #zeroday #biz #winrar
Ars Technica
WinRAR 0-day that uses poisoned JPG and TXT files under exploit since April
Vulnerability allows hackers to execute malicious code when targets open malicious ZIP files.
Media is too big
VIEW IN TELEGRAM
Horror Stories from the Automotive Industry | Chaos Computer Club Berlin - Video
In this talk, we will revisit some of the scariest stories we faced during more than 50 penetration testing and security research projects, with a twist. In the ever-emerging industry of automotive, with old and new OEMs trying to get a share of the pie, many things are at stake, with many things getting overlooked, forgotten, or even deliberately covered.
We will go through a journey of critical findings in different targets and the constant battle between penetration testers, developers, and mid to upper management. This will help the audience get an understanding of how the industry behaves right now, what they (and what we) are doing wrong, and how the future of automotive security should be shaped, not only for the sake of security, but also for the sake of safety and reliability.
https://www.youtube.com/watch?v=rAA-agcNeeg
#cars #OEM #Automobile #PenTesting #Automotive #security #safety #CCCde
In this talk, we will revisit some of the scariest stories we faced during more than 50 penetration testing and security research projects, with a twist. In the ever-emerging industry of automotive, with old and new OEMs trying to get a share of the pie, many things are at stake, with many things getting overlooked, forgotten, or even deliberately covered.
We will go through a journey of critical findings in different targets and the constant battle between penetration testers, developers, and mid to upper management. This will help the audience get an understanding of how the industry behaves right now, what they (and what we) are doing wrong, and how the future of automotive security should be shaped, not only for the sake of security, but also for the sake of safety and reliability.
https://www.youtube.com/watch?v=rAA-agcNeeg
#cars #OEM #Automobile #PenTesting #Automotive #security #safety #CCCde
Privacy Companies Push Back Against EU Plot To End Online Privacy
An urgent appeal has been relayed to ministers across the #EU by a consortium of tech companies, exacting a grave warning against backing a proposed regulation focusing on child sexual abuse as a pretense to jeopardize the security integrity of internet services relying on end-to-end encryption and end privacy for all citizens.
In a open letter a total of 18 organizations – predominantly comprising providers of encrypted email and messaging services – have voiced concerns about the potential experimental regulation by the European Commission (EC), singling out the “detrimental” effects on children’s #privacy and #security and the possible dire repercussions for #cybersecurity.
#BigBrother #EUChatControl
#ChatControl #Encryption
An urgent appeal has been relayed to ministers across the #EU by a consortium of tech companies, exacting a grave warning against backing a proposed regulation focusing on child sexual abuse as a pretense to jeopardize the security integrity of internet services relying on end-to-end encryption and end privacy for all citizens.
In a open letter a total of 18 organizations – predominantly comprising providers of encrypted email and messaging services – have voiced concerns about the potential experimental regulation by the European Commission (EC), singling out the “detrimental” effects on children’s #privacy and #security and the possible dire repercussions for #cybersecurity.
#BigBrother #EUChatControl
#ChatControl #Encryption
https://news.northeastern.edu/2024/02/08/security-camera-privacy-hacking/
https://www.ndss-symposium.org/ndss-paper/em-eye-characterizing-electromagnetic-side-channel-eavesdropping-on-embedded-cameras/
#security #camera #webcam
https://www.ndss-symposium.org/ndss-paper/em-eye-characterizing-electromagnetic-side-channel-eavesdropping-on-embedded-cameras/
#security #camera #webcam
Northeastern Global News
How secure is your security camera? Hackers can spy on cameras through walls, new research finds
Researchers uncover a significant gap in the privacy infrastructure of security cameras. A cybersecurity expert discusses the implications.
Media is too big
VIEW IN TELEGRAM
Know Thy Enemy: The Taxonomies That Meta Uses to Map the Offensive Privacy Space
This talk introduces and examines privacy-inclusive taxonomies Meta has developed and uses to track privacy weaknesses, enumerate privacy adversarial TTPs, deconflict privacy and security efforts, and scale detection and remediation efforts. Taxonomies, such as #MITRE's #CVE, #CAPEC, and #ATT&CK® #frameworks, have long been used to track and understand cybersecurity weaknesses and the tactics of cyber adversaries. These taxonomies help #organizations stay abreast of trends, guide software development best practices, and pinpoint the most effective remediation and detection strategies to common #cybersecurity issues. As the field of offensive privacy matures, organizations require similar taxonomies to understand #privacy threats and align efforts across #security and privacy teams....
By: Zach Miller , David Renardy
Full Abstract and Presentation Materials
This talk introduces and examines privacy-inclusive taxonomies Meta has developed and uses to track privacy weaknesses, enumerate privacy adversarial TTPs, deconflict privacy and security efforts, and scale detection and remediation efforts. Taxonomies, such as #MITRE's #CVE, #CAPEC, and #ATT&CK® #frameworks, have long been used to track and understand cybersecurity weaknesses and the tactics of cyber adversaries. These taxonomies help #organizations stay abreast of trends, guide software development best practices, and pinpoint the most effective remediation and detection strategies to common #cybersecurity issues. As the field of offensive privacy matures, organizations require similar taxonomies to understand #privacy threats and align efforts across #security and privacy teams....
By: Zach Miller , David Renardy
Full Abstract and Presentation Materials
Media is too big
VIEW IN TELEGRAM
The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders
Modern video encoding standards such as H.264 are a marvel of hidden complexity. But with hidden complexity comes hidden #security risk. #Decoding video today involves interacting with dedicated #hardware accelerators and the #proprietary, privileged software components used to drive (#driver) them. The video #decoder ecosystem is obscure, opaque, diverse, highly privileged, largely untested, and highly exposed -- a dangerous combination.
We introduce H26Forge, a framework that carefully crafts #video files to expose edge cases in H.264 decoders....
By: Stephen Checkoway , Hovav Shacham , Willy Vasquez
Full Abstract and Presentation Materials
#VideoEncoding #Vulnerabilities #Security #Codec #H264 #Exploit
Modern video encoding standards such as H.264 are a marvel of hidden complexity. But with hidden complexity comes hidden #security risk. #Decoding video today involves interacting with dedicated #hardware accelerators and the #proprietary, privileged software components used to drive (#driver) them. The video #decoder ecosystem is obscure, opaque, diverse, highly privileged, largely untested, and highly exposed -- a dangerous combination.
We introduce H26Forge, a framework that carefully crafts #video files to expose edge cases in H.264 decoders....
By: Stephen Checkoway , Hovav Shacham , Willy Vasquez
Full Abstract and Presentation Materials
#VideoEncoding #Vulnerabilities #Security #Codec #H264 #Exploit
n0rthl1ght/ahwt: Another Hardening Windows Tool – GitHub
GPL-3.0 license
AHWT - another hardening tool for Windows operating systems.
Description (on RUS)
Program is a script generator with collection of parameters and recommendations from CIS Benchmarks and DoD STIGs with some adjusments.
All parameters placed in databases with the names of the operating systems that are used to.
Parameters were checked and tested according to official MS documentation and researchers opinion.
Scripts generates in 2 modes - auto and manual.
All databases have profiles for each operating system min/med/full which corresponds with Minimum (only level 3 parameters (CIS lvl 2/STIG lvl 3)), Medium (level 2 & 3 parameters (CIS lvl 1 & 2/STIG lvl 2)) and Full (lvl 1-3 parameters).
#Windows #Hardening #Security
GPL-3.0 license
AHWT - another hardening tool for Windows operating systems.
Description (on RUS)
Program is a script generator with collection of parameters and recommendations from CIS Benchmarks and DoD STIGs with some adjusments.
All parameters placed in databases with the names of the operating systems that are used to.
Parameters were checked and tested according to official MS documentation and researchers opinion.
Scripts generates in 2 modes - auto and manual.
All databases have profiles for each operating system min/med/full which corresponds with Minimum (only level 3 parameters (CIS lvl 2/STIG lvl 3)), Medium (level 2 & 3 parameters (CIS lvl 1 & 2/STIG lvl 2)) and Full (lvl 1-3 parameters).
#Windows #Hardening #Security
Safe Space (A safe space for your digital valuables.)
Safe space is an app that creates a separate place on your android device to store valuable files. This storage location is not visible to other apps and is encrypted by the system by default.
Features:
* Store files in a secure storage location that is not visible to other apps and is secured by device encryption and system authentication (Biometric and PIN/Pattern/Password)
* Open Images, Audio, Video, PDF documents and plain text documents
* Create simple text notes without leaving the app
* Dark and light mode
* ability to copy and move files
* Import from and export files to external storage without storage permissions
* Completely offline with no telemetry and data collection
https://f-droid.org/packages/org.privacymatters.safespace
#Android #Security #Privacy
#EncryptedFiles
Safe space is an app that creates a separate place on your android device to store valuable files. This storage location is not visible to other apps and is encrypted by the system by default.
Features:
* Store files in a secure storage location that is not visible to other apps and is secured by device encryption and system authentication (Biometric and PIN/Pattern/Password)
* Open Images, Audio, Video, PDF documents and plain text documents
* Create simple text notes without leaving the app
* Dark and light mode
* ability to copy and move files
* Import from and export files to external storage without storage permissions
* Completely offline with no telemetry and data collection
https://f-droid.org/packages/org.privacymatters.safespace
#Android #Security #Privacy
#EncryptedFiles
:: privacy.sexy — Privacy is sexy
:: 🔐 Enforce privacy & security best-practices on Windows, macOS and Linux.
:: -- 🤔 How to use
:: 📙 Start by exploring different categories and choosing different tweaks.
:: 📙 On top left, you can apply predefined selections for privacy level you'd like.
:: 📙 After you choose any tweak, you can download or copy to execute your script.
:: 📙 Come back regularly to apply latest version for stronger privacy and security.
:: -- 🧐 Why privacy.sexy
:: ✔️ Rich tweak pool to harden security & privacy of the OS and other software on it.
:: ✔️ No need to run any compiled software on your system, just run the generated scripts.
:: ✔️ Have full visibility into what the tweaks do as you enable them.
:: ✔️ Open-source and free (both free as in beer and free as in speech).
:: ✔️ Committed to your safety with strong security measures.
https://privacy.sexy/
#Privacy #Security #GnuLinux #MacOS #Windows
:: 🔐 Enforce privacy & security best-practices on Windows, macOS and Linux.
:: -- 🤔 How to use
:: 📙 Start by exploring different categories and choosing different tweaks.
:: 📙 On top left, you can apply predefined selections for privacy level you'd like.
:: 📙 After you choose any tweak, you can download or copy to execute your script.
:: 📙 Come back regularly to apply latest version for stronger privacy and security.
:: -- 🧐 Why privacy.sexy
:: ✔️ Rich tweak pool to harden security & privacy of the OS and other software on it.
:: ✔️ No need to run any compiled software on your system, just run the generated scripts.
:: ✔️ Have full visibility into what the tweaks do as you enable them.
:: ✔️ Open-source and free (both free as in beer and free as in speech).
:: ✔️ Committed to your safety with strong security measures.
https://privacy.sexy/
#Privacy #Security #GnuLinux #MacOS #Windows
Resources on #systemd as well as a lot of options that are de-systemD. As well as hardening #guides, #privacy and #security stuff too
https://start.me/p/Kg8keE/priv-sec
https://start.me/p/Kg8keE/priv-sec
Start.me
Priv/sec - Start.me
A startpage with online resources about Priv/sec, created by Start.me.
A post from the developer of #WireGuard on the severe #security flaws and lack of trustworthiness of #FDroid:
https://bsky.app/profile/grapheneos.org/post/3lgq7wqwzpk26
The Bluesky link has GrapheneOS posts explaining
https://gitlab.com/fdroid/fdroiddata/-/issues/3110#note_1613430404
Stuff here but not to the point like the Bluesky link
https://discuss.grapheneos.org/d/18731-f-droid-vulnerability-allows-bypassing-certificate-pinning/
https://bsky.app/profile/grapheneos.org/post/3lgq7wqwzpk26
The Bluesky link has GrapheneOS posts explaining
https://gitlab.com/fdroid/fdroiddata/-/issues/3110#note_1613430404
Stuff here but not to the point like the Bluesky link
https://discuss.grapheneos.org/d/18731-f-droid-vulnerability-allows-bypassing-certificate-pinning/
Bluesky Social
GrapheneOS (@grapheneos.org)
A post from the developer of WireGuard on the severe security flaws and lack of trustworthiness of F-Droid:
https://gitlab.com/fdroid/fdroiddata/-/issues/3110#note_1613430404
https://gitlab.com/fdroid/fdroiddata/-/issues/3110#note_1613430404
What are your favorite hardware and open source software for #security #cams, #video #surveillance, #ring #doorbells, #motion detection, #homeassistant...?
What #alternatives do we have?
What #alternatives do we have?
Forwarded from 0•Bytes•1
Hello, my Sonys and Cheshire Cats! 🐭✨🐈⬛
Today we're going to talk about 6G📶
6G, or the sixth generation of mobile networks. If 5G gave us fast internet andmyths about killer towers, then 6G will raise the bar📡
Imagine data transfer speeds of up to 100 Gbps — that's hundreds of times faster than 5G! 6G will integrate AI, terahertz waves, and satellites. Standards are already being developed (thanks, 3GPP!), and the first commercial networks are expected by 2030. Europe, with its telecom giants Nokia and Ericsson, is actively participating in the race, but the US (with FutureG and DARPA projects) and China (with Huawei) are not far behind🧩
6G operates on terahertz waves — frequencies ranging from 100 GHz to 10 THz, which transmit data so fast that 5G nervously smokes on the sidelines.
But there is one small nuance:it doesn't work well in practice, as these waves don't pass through walls very well😓, so dense networks with lots of small antennas (massive MIMO) are needed. Traffic and security management is handled by AI, which distributes the data. Quantum encryption is also used to protect communications. 6G also has blockchain, which is needed for transparency: blockchain records who uses the network and how. Satellites are connected to provide coverage in remote areas, and RIS (smart reflective surfaces) technology helps direct signals where walls interfere.
But, as you can imagine, it's not all sunshine and rainbows, and 6G has a huge attack surface that is currently being actively studied🔓
For example, there are current threats related to the growing number of connected devices. 6G promises to connect a multitude of IoT devices. Each such device is a potential entry point for attackers. Hack one sensor in the power grid and the city is without power. Add to this the use of terahertz frequencies, which transmit data quickly but are vulnerable to local interception or jamming due to their limited range. Another headache is artificial intelligence: attackers can feed it fake data, and it will start directing traffic to nowhere. Quantum computers (still a long way off) could destroy cryptography, such as RSA, to smithereens. Don't forget the risks associated with decentralization. Processing data at the edge of the network, close to devices, reduces latency but makes these nodes an easy target for attacks, especially if they are not sufficiently protected. Attacks on the supply chain, such as the introduction of hardware Trojans, also pose a serious threat, given the complexity of manufacturing 6G equipment. Finally, scenarios such as digital twin spoofing or interference with robots can have certain consequences.
But there is no shortage of protection — developers are already coming up with ways to deal with threats🛡
They are creating cryptography that can withstand quantum attacks. Post-quantum cryptography uses complex mathematical problems to keep data secure (although some algorithms could use some refinement against conventional threats ). Quantum key distribution makes encryption unbreakable; any attempt at interception is immediately noticeable. For devices such as IoT sensors, encryption algorithms are being developed that do not require powerful hardware.
AI also helps: it searches for suspicious behavior in real time, checks data, and blocks attacks. Blockchain removes weak links, and smart contracts automatically control access, reducing the risk of errors. For terahertz waves, jamming technologies are used to prevent signal interception. Devices receive unique “fingerprints” so that they cannot be counterfeited.
Personally, I am still a little skeptical about 6G:
If you want to learn more about 6G architecture, its security, check the archive, which contains articles that will help you learn more❤️🛠
#6g #attacks #Blockchain #network #neural_networks #quantum_computer #security
Today we're going to talk about 6G📶
6G, or the sixth generation of mobile networks. If 5G gave us fast internet and
Imagine data transfer speeds of up to 100 Gbps — that's hundreds of times faster than 5G! 6G will integrate AI, terahertz waves, and satellites. Standards are already being developed (thanks, 3GPP!), and the first commercial networks are expected by 2030. Europe, with its telecom giants Nokia and Ericsson, is actively participating in the race, but the US (with FutureG and DARPA projects) and China (with Huawei) are not far behind🧩
6G operates on terahertz waves — frequencies ranging from 100 GHz to 10 THz, which transmit data so fast that 5G nervously smokes on the sidelines.
But there is one small nuance:
But, as you can imagine, it's not all sunshine and rainbows, and 6G has a huge attack surface that is currently being actively studied🔓
For example, there are current threats related to the growing number of connected devices. 6G promises to connect a multitude of IoT devices. Each such device is a potential entry point for attackers. Hack one sensor in the power grid and the city is without power. Add to this the use of terahertz frequencies, which transmit data quickly but are vulnerable to local interception or jamming due to their limited range. Another headache is artificial intelligence: attackers can feed it fake data, and it will start directing traffic to nowhere. Quantum computers (still a long way off) could destroy cryptography, such as RSA, to smithereens. Don't forget the risks associated with decentralization. Processing data at the edge of the network, close to devices, reduces latency but makes these nodes an easy target for attacks, especially if they are not sufficiently protected. Attacks on the supply chain, such as the introduction of hardware Trojans, also pose a serious threat, given the complexity of manufacturing 6G equipment. Finally, scenarios such as digital twin spoofing or interference with robots can have certain consequences.
But there is no shortage of protection — developers are already coming up with ways to deal with threats
They are creating cryptography that can withstand quantum attacks. Post-quantum cryptography uses complex mathematical problems to keep data secure (
AI also helps: it searches for suspicious behavior in real time, checks data, and blocks attacks. Blockchain removes weak links, and smart contracts automatically control access, reducing the risk of errors. For terahertz waves, jamming technologies are used to prevent signal interception. Devices receive unique “fingerprints” so that they cannot be counterfeited.
Personally, I am still a little skeptical about 6G:
it seems to me that they want to cram a bunch of hyped technologies into it that may not work as intended in practice. But it seems that this technology is being actively developed, so let's see what happens next🔑If you want to learn more about 6G architecture, its security, check the archive, which contains articles that will help you learn more❤️🛠
#6g #attacks #Blockchain #network #neural_networks #quantum_computer #security
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from 0•Bytes•1
6g.zip
10.7 MB
В архиве есть статьи про архктикуру 6g, про возможные атаки на него, а так же про меры защиты. Надеюсь вам будет полезно 📶❤️🔥
In the archive there are articles about the 6g archktikuru, about possible attacks on it, as well as defense measures. I hope you will find it useful 📶❤️🔥
#6g #attacks #Blockchain #network #neural_networks #quantum_computer #security #phishing #protection #post_quantum
In the archive there are articles about the 6g archktikuru, about possible attacks on it, as well as defense measures. I hope you will find it useful 📶❤️🔥
#6g #attacks #Blockchain #network #neural_networks #quantum_computer #security #phishing #protection #post_quantum
Forwarded from 0•Bytes•1
Welcome to my Alice tea party! 🫖🎀
I decided to write a series of short posts about secure operating systems 🖥🐧
Today, we'll take a look at Whonix and find out if it's as good and anonymous as people say.Spoiler alert: no, it's not.
Let me clarify right away: Whonix is not a full-fledged operating system, but a tool for anonymity that can work independently or as a router in Qubes OS. In this article, I will focus on analyzing how it works as a standalone system
How does Whonix work?🧩
Whonix is built on two virtual machines: Whonix-Gateway and Whonix-Workstation. Gateway configures and routes all your traffic through the Tor network. Workstation is your workplace. If you want to dig deeper, check out their documentation.
Problems with Whonix 🔓
Now to the point: why Whonix isn't really necessary. Let's start with Gateway. It's just Debian with Tor pre-installed and a bunch of scripts that redirect traffic through Tor. Everything is tied to the configuration in the settings file and iptables rules. Cool? Not really. Plus, Whonix drags along old Debian, where packages are updated once in a blue moon.
Whonix positions itself as super protection against leaks, but if you don't understand what you're doing, no virtual machine will save you. For example, if you run a browser with JavaScript or download files and then open them outside of Workstation, your anonymity is gone.
By the way, Whonix can only be run without problems on VirtualBox. You may argue that there are versions for KVM/QEMU on their website. But that's where the problems begin. If you take Whonix for KVM, you won't be able to install it just like that — you need to edit the configuration, and there are no detailed instructions on how to do this anywhere. With VirtualBox, however, there are no such problems — everything works out of the box.
But what's wrong with VirtualBox?🪤
Besides the fact that it is significantly slower than KVM. In March 2025, a vulnerability CVE-2025-30712 with a rating of 8.1 appeared in Virtualbox. It allows an attacker with access to the host system to perform a VM escape, i.e., to get out of the virtual machine onto your main computer🫠. Proof-of-concept is already circulating on the network, and exploitation is easier than it seems. If the host is compromised, all your anonymity goes down the drain, and your real IP or other data may leak.
How to make an analogue of Whunix Gateway? ⚙️
But there is another way. The Gateway model itself is not bad. But you can create a machine with it yourself without Whunix, using a minimalist Linux (such as Gentoo or even FreeBSD instead of Linux). Then configure Tor directly. After all, Gateway is just a wrapper around the standard Tor and iptables settings, which can be found on Google in five minutes. Now add the iptables you found and DNSPort to the Tor config so that DNS requests also go through Tor, and that's it. This takes up less space and reduces the attack surface.
Conclusion
To be fair, Whonix isn't always bad. But it can be useful in conjunction with Qubes OS (where it runs in KVM, by the way), which has additional security mechanisms, such as domain isolation, that enhance security. But apart from Qubes, Whonix is pretty pointless. You might think it's suitable for those who don't want to bother with configuring Tor, but that's not the case. To run Whonix on a decent VM, such as KVM, you'll have to go through just as much trouble.
The bottom line is simple: Whonix is not a super-anonymous OS, but a tool that complicates life more than it protects it💊
I hope you found this useful.❤️✨ If you wish, you can explore the topic yourself by reading research and testing the system.
Here are some good articles about Whonix:
THESIS.pdf — here is an overview of anonymous operating systems, including Whonix.
Whonix and Tor Limitations — about the shortcomings of Whonix and Tor.
JOSH Article — analysis of Whonix limitations.
#anonymity #linux #whunix #cve #anonymity_os #tor #security
I decided to write a series of short posts about secure operating systems 🖥
Today, we'll take a look at Whonix and find out if it's as good and anonymous as people say.
Let me clarify right away: Whonix is not a full-fledged operating system, but a tool for anonymity that can work independently or as a router in Qubes OS. In this article, I will focus on analyzing how it works as a standalone system
How does Whonix work?🧩
Whonix is built on two virtual machines: Whonix-Gateway and Whonix-Workstation. Gateway configures and routes all your traffic through the Tor network. Workstation is your workplace. If you want to dig deeper, check out their documentation.
Problems with Whonix 🔓
Now to the point: why Whonix isn't really necessary. Let's start with Gateway. It's just Debian with Tor pre-installed and a bunch of scripts that redirect traffic through Tor. Everything is tied to the configuration in the settings file and iptables rules. Cool? Not really. Plus, Whonix drags along old Debian, where packages are updated once in a blue moon.
Whonix positions itself as super protection against leaks, but if you don't understand what you're doing, no virtual machine will save you. For example, if you run a browser with JavaScript or download files and then open them outside of Workstation, your anonymity is gone.
By the way, Whonix can only be run without problems on VirtualBox. You may argue that there are versions for KVM/QEMU on their website. But that's where the problems begin. If you take Whonix for KVM, you won't be able to install it just like that — you need to edit the configuration, and there are no detailed instructions on how to do this anywhere. With VirtualBox, however, there are no such problems — everything works out of the box.
But what's wrong with VirtualBox?🪤
Besides the fact that it is significantly slower than KVM. In March 2025, a vulnerability CVE-2025-30712 with a rating of 8.1 appeared in Virtualbox. It allows an attacker with access to the host system to perform a VM escape, i.e., to get out of the virtual machine onto your main computer🫠. Proof-of-concept is already circulating on the network, and exploitation is easier than it seems. If the host is compromised, all your anonymity goes down the drain, and your real IP or other data may leak.
How to make an analogue of Whunix Gateway? ⚙️
But there is another way. The Gateway model itself is not bad. But you can create a machine with it yourself without Whunix, using a minimalist Linux (such as Gentoo or even FreeBSD instead of Linux). Then configure Tor directly. After all, Gateway is just a wrapper around the standard Tor and iptables settings, which can be found on Google in five minutes. Now add the iptables you found and DNSPort to the Tor config so that DNS requests also go through Tor, and that's it. This takes up less space and reduces the attack surface.
Conclusion
To be fair, Whonix isn't always bad. But it can be useful in conjunction with Qubes OS (where it runs in KVM, by the way), which has additional security mechanisms, such as domain isolation, that enhance security. But apart from Qubes, Whonix is pretty pointless. You might think it's suitable for those who don't want to bother with configuring Tor, but that's not the case. To run Whonix on a decent VM, such as KVM, you'll have to go through just as much trouble.
The bottom line is simple: Whonix is not a super-anonymous OS, but a tool that complicates life more than it protects it
I hope you found this useful.❤️✨ If you wish, you can explore the topic yourself by reading research and testing the system.
Here are some good articles about Whonix:
THESIS.pdf — here is an overview of anonymous operating systems, including Whonix.
Whonix and Tor Limitations — about the shortcomings of Whonix and Tor.
JOSH Article — analysis of Whonix limitations.
#anonymity #linux #whunix #cve #anonymity_os #tor #security
Please open Telegram to view this post
VIEW IN TELEGRAM
Whonix
Whonix Documentation
A Crash Course in Anonymity and Security on the Internet.
0•Bytes•1
monero_en.pdf
Hello, my Mad Hatter friends! 🎩
Let me ask you a question: have you ever wondered how Monero's security works and whether it is as reliable as they say?🪙
In my new article, I figured this out and also explained how to further protect yourself so that your transactions remain invisible even to the most curious eyes.🛡
I describe in detail how Monero works, how resistant it is to attacks, and what measures will help you maintain your anonymity. 🔑
The article covers attacks ranging from Black Marble Flooding to Eclipse Attacks, and I also share practical tips on how to run your own node and configure Tor to increase your privacy.
I hope you will find it interesting to delve into this topic. 🧩 At the end of the article, there are links to additional materials so that you can explore this topic in more depth if you wish. ⚙️
Enjoy your tea! ☕️🩷
English version:
#Monero #XMR #cryptography #privacy #blockchain #ring_signatures #stealth_addresses #RingCT #Tor #I2P #crypto_wallet #security #anonymity #decentralization #Kovri #FCMP #crypto_protection
Let me ask you a question: have you ever wondered how Monero's security works and whether it is as reliable as they say?🪙
In my new article, I figured this out and also explained how to further protect yourself so that your transactions remain invisible even to the most curious eyes.🛡
I describe in detail how Monero works, how resistant it is to attacks, and what measures will help you maintain your anonymity. 🔑
The article covers attacks ranging from Black Marble Flooding to Eclipse Attacks, and I also share practical tips on how to run your own node and configure Tor to increase your privacy.
I hope you will find it interesting to delve into this topic. 🧩 At the end of the article, there are links to additional materials so that you can explore this topic in more depth if you wish. ⚙️
Enjoy your tea! ☕️🩷
English version:
#Monero #XMR #cryptography #privacy #blockchain #ring_signatures #stealth_addresses #RingCT #Tor #I2P #crypto_wallet #security #anonymity #decentralization #Kovri #FCMP #crypto_protection