SlideShare a Scribd company logo
Akshay Vasava (MA074)
Content
 Introduction
 Why WHONIX
 Structure of WHONIX
 Pros
 Cons
 Applications
 Conclusion
Are you safe?
Introduction
 WHONIX aims at preserving your privacy and anonymity
by helping you use your applications anonymously. A web
browser, IRC client, word processor and more pre-
configured with security in mind.
 It is a complete operating system designed to be used
inside a host operating system. It is Free Software and
based on Tor, <<vanilla>>Debian GNU/Linux and security by
isolation.
Why WHONIX?
Security by Isolation
 Two parts:
 Whonix Workstation – Working with applications
 Whonix Gateway – Routing via Tor
Cont…
Anonymity online through Tor
 Whonix relies on the Tor network to protect your
anonymity online
 All connections are either forced through it or blocked.
 Tor protects by bouncing communications around a
distributed network of relays run by volunteers all around
the world.
Cont…
Based on Debian
 To oversimplify it: Whonix is just a collection of
configuration files and scripts.
 Anything you can do with “vanilla” Debian GNU/Linux, you
can do with Whonix.
 Whonix doesn’t break anything and doesn’t stop you from
using anything you want.
 Ex. Installing xrandr
Structure of WHONIX
 Distributed as:
 Gateway
 Workstation
 Virtualization engine
 VirtualBox
 VM runs a check to ensure – software & date and time is up to date
Working
Cont…
 Workstation
 Connected to the gateway
 Security by isolation
 Tor artefacts – xchat,
torchat, gpg encryption,
bitcoin software etc.
 Gateway
 Routing all internet
traffic through Tor
 Not recommended to use
for anything else than a
gateway
Cont…
 User applications therefore have no knowledge of the
user’s “real” IP address, nor do they have access to any
information about the physical hardware.
 In order to obtain such information , an application would
have to find a way “break out” of VirtualBox, or to
subvert the Gateway.
WHONIX OS
WHONIX OS
Working of Tor
WHONIX OS
WHONIX OS
Cont…
 The Gateway VM
 Running Tor
 Virtual network interfaces
 One of it is connected to outside Internet on VM Host (Tor relays)
 Other connected to virtual LAN (Runs inside host)
 The Workstation VM
 Running user applications
 Internal virtual LAN communicate with Gateway
 Forces all traffic coming from workstation to pass through Tor
 Workstation VM can “see” only IP addresses on the Internal LAN
Cont…
 The web browser pre-installed in the Workstation VM is
the modified version of Mozilla Firefox provided by the
Tor as part of its Tor browser package.
 This Browser has been changed to reduce the amount of
system specific information leaked to Web servers.
WHONIX OS
Pros.
 All applications, including those, which do not support
proxy settings, will be routed through Tor
 Java / Javascript / flash / Browser Plugins /
misconfigured applications cannot leak your real external
IP
 Hide your IP address
 Prevent your ISP from spying on you
 Prevent websites from identifying you
Cont…
 Prevent malware from identifying you
 Whonix does even protect against root exploits(Malware
with root rights) on the workstation
 Best possible Protocol-Leak-Protection and
Fingerprinting-Protection
 Circumvent censorship
Cons…
 Whonix is produced independently from the Tor
anonymity software and carries no guarantee from the
Tor Project about quality, suitability or anything else.
Applications
 Anonymity
Cont…
 Privacy & Security
Conclusion
 A free and open Operating System
 An anti-censorship tool
 The first step among many in hiding your identity
 The best thing to hide your identity
 A complete operating system designed to be used inside
host operating system.
 It is free software and based on Tor, Debian GNU/Linux
and security by isolation
Footnotes/References
 https://techrepublic.com/blog/smb-technologist
 https://www.whonix.org/wiki/About
 https://www.torproject.org/about/overview.html.en
 https://anonymous-proxy-servers.net/forum
WHONIX OS

More Related Content

What's hot (20)

PDF
Ransomware attacks
Texas Medical Liability Trust
 
PPTX
Dark web markets: from the silk road to alphabay, trends and developments
Andres Baravalle
 
PPTX
Ethical hacking - Footprinting.pptx
Nargis Parveen
 
PDF
Ceh v5 module 02 footprinting
Vi Tính Hoàng Nam
 
PDF
OSINT for Attack and Defense
Andrew McNicol
 
PPT
Port scanning
Hemanth Pasumarthi
 
PDF
6 Security Tips for Using Public WiFi
Quick Heal Technologies Ltd.
 
PPT
DDoS Attack PPT by Nitin Bisht
Nitin Bisht
 
PDF
IoT Security, Mirai Revisited
Clare Nelson, CISSP, CIPP-E
 
PDF
MITRE ATT&CKcon 2.0: ATT&CK Updates - PRE-ATT&CK Integration; Adam Pennington...
MITRE - ATT&CKcon
 
PPTX
Mobile Forensics
primeteacher32
 
PDF
Ransomware
m3 Networks Limited
 
PDF
Analysing Ransomware
Napier University
 
PPTX
Ethical hacking
Ganesh Vadulekar
 
PDF
Social Engineering Basics
Luke Rusten
 
PPT
Ethical Hacking
Keith Brooks
 
PPTX
Mobile Forensics
abdullah roomi
 
PPTX
OK Google, How Do I Red Team GSuite?
Beau Bullock
 
PDF
Application layer security protocol
Kirti Ahirrao
 
PDF
What is Network Security?
Faith Zeller
 
Ransomware attacks
Texas Medical Liability Trust
 
Dark web markets: from the silk road to alphabay, trends and developments
Andres Baravalle
 
Ethical hacking - Footprinting.pptx
Nargis Parveen
 
Ceh v5 module 02 footprinting
Vi Tính Hoàng Nam
 
OSINT for Attack and Defense
Andrew McNicol
 
Port scanning
Hemanth Pasumarthi
 
6 Security Tips for Using Public WiFi
Quick Heal Technologies Ltd.
 
DDoS Attack PPT by Nitin Bisht
Nitin Bisht
 
IoT Security, Mirai Revisited
Clare Nelson, CISSP, CIPP-E
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - PRE-ATT&CK Integration; Adam Pennington...
MITRE - ATT&CKcon
 
Mobile Forensics
primeteacher32
 
Analysing Ransomware
Napier University
 
Ethical hacking
Ganesh Vadulekar
 
Social Engineering Basics
Luke Rusten
 
Ethical Hacking
Keith Brooks
 
Mobile Forensics
abdullah roomi
 
OK Google, How Do I Red Team GSuite?
Beau Bullock
 
Application layer security protocol
Kirti Ahirrao
 
What is Network Security?
Faith Zeller
 

Viewers also liked (14)

PPSX
testing
nychowdhury22
 
PPTX
Slide share
lolorolo360
 
DOCX
Motivational camp 2013
SMK Batu Unjur
 
PPTX
Itc
Manmohan Singh
 
PPT
Mymanet
Akshay Vasava
 
PPT
Test
MELIAU
 
DOCX
Escuel a primaria anexa
Jazmin Sosa
 
PDF
My Portfolio 2013
Satoko Hinomizu
 
PPTX
N3XT
Akshay Vasava
 
PDF
Barclays case bs
Manmohan Singh
 
PDF
Working capital management
anshulbandela
 
PPTX
3 D Internet
Akshay Vasava
 
DOCX
Tatakelola Badan Layanan Umum Daerah (BLUD)
Marsusilanata Wawan
 
PPTX
Touchless Touchscreen Technology
Akshay Vasava
 
testing
nychowdhury22
 
Slide share
lolorolo360
 
Motivational camp 2013
SMK Batu Unjur
 
Mymanet
Akshay Vasava
 
Test
MELIAU
 
Escuel a primaria anexa
Jazmin Sosa
 
My Portfolio 2013
Satoko Hinomizu
 
Barclays case bs
Manmohan Singh
 
Working capital management
anshulbandela
 
3 D Internet
Akshay Vasava
 
Tatakelola Badan Layanan Umum Daerah (BLUD)
Marsusilanata Wawan
 
Touchless Touchscreen Technology
Akshay Vasava
 
Ad

Similar to WHONIX OS (20)

PDF
Defcon 22-adrian-crenshaw-dropping-docs-on-darknets-how-peop
Priyanka Aash
 
PDF
anonguide July 17 2015
Parker -= lil_king420 =-
 
PDF
Anonguide
Arif Wahyudi
 
PDF
Defcon 22-metacortex-grifter-darkside-of-the-internet
Priyanka Aash
 
PDF
CryptoParty Belfast July 2015 Online Privacy Tips
pgmaynard
 
PDF
TOR... ALL THE THINGS Whitepaper
CrowdStrike
 
PPT
Usability of Tor
Jeremy Clark
 
PDF
Tor talk-prosa-screen
Henrik Kramshøj
 
PPTX
Demystifying Secure Channel
Viral Parmar
 
PDF
Anonymity Network TOR
A.K.M Bahalul Haque Pallob
 
PPTX
Introduction to anonymity network tor
Khaled Mosharraf
 
PPTX
The Dark Web : Hidden Services
Anshu Singh
 
PPTX
Illuminating the dark web
Jisc
 
PPSX
Geek Night 15.0 - Touring the Dark-Side of the Internet
GeekNightHyderabad
 
PPT
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
OWASP Delhi
 
PPTX
Анонимность Tor: миф и реальность
CEE-SEC(R)
 
PPTX
Privacy on the Internet - Init6 InfoSec August Meeting
Jose L. Quiñones-Borrero
 
PPTX
Tor network seminar by 13504
Prashant Rana
 
PPTX
Reinventing anon email
antitree
 
Defcon 22-adrian-crenshaw-dropping-docs-on-darknets-how-peop
Priyanka Aash
 
anonguide July 17 2015
Parker -= lil_king420 =-
 
Anonguide
Arif Wahyudi
 
Defcon 22-metacortex-grifter-darkside-of-the-internet
Priyanka Aash
 
CryptoParty Belfast July 2015 Online Privacy Tips
pgmaynard
 
TOR... ALL THE THINGS Whitepaper
CrowdStrike
 
Usability of Tor
Jeremy Clark
 
Tor talk-prosa-screen
Henrik Kramshøj
 
Demystifying Secure Channel
Viral Parmar
 
Anonymity Network TOR
A.K.M Bahalul Haque Pallob
 
Introduction to anonymity network tor
Khaled Mosharraf
 
The Dark Web : Hidden Services
Anshu Singh
 
Illuminating the dark web
Jisc
 
Geek Night 15.0 - Touring the Dark-Side of the Internet
GeekNightHyderabad
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
OWASP Delhi
 
Анонимность Tor: миф и реальность
CEE-SEC(R)
 
Privacy on the Internet - Init6 InfoSec August Meeting
Jose L. Quiñones-Borrero
 
Tor network seminar by 13504
Prashant Rana
 
Reinventing anon email
antitree
 
Ad

Recently uploaded (20)

PDF
PRIZ Academy - Change Flow Thinking Master Change with Confidence.pdf
PRIZ Guru
 
PPT
IISM Presentation.ppt Construction safety
lovingrkn
 
PDF
An Evaluative Study on Performance Growth Plan of ICICI Mutual Fund and SBI M...
PoonamKilaniya
 
PPTX
Cyclic_Redundancy_Check_Presentation.pptx
alhjranyblalhmwdbdal
 
PPT
Hazard identification and risk assessment PPT
SUNILARORA51
 
PPTX
Sensor IC System Design Using COMSOL Multiphysics 2025-July.pptx
James D.B. Wang, PhD
 
PPTX
Dolphin_Conservation_AI_txhasvssbxbanvgdghng
jeeaspirant2026fr
 
PPTX
Fluid statistics and Numerical on pascal law
Ravindra Kolhe
 
PDF
Call For Papers - International Journal on Natural Language Computing (IJNLC)
kevig
 
PDF
th International conference on Big Data, Machine learning and Applications (B...
Zac Darcy
 
PDF
MOBILE AND WEB BASED REMOTE BUSINESS MONITORING SYSTEM
ijait
 
PDF
1_ISO Certifications by Indian Industrial Standards Organisation.pdf
muhammad2010960
 
PPTX
Mining Presentation Underground - Copy.pptx
patallenmoore
 
PDF
Natural Language processing and web deigning notes
AnithaSakthivel3
 
PDF
POWER PLANT ENGINEERING (R17A0326).pdf..
haneefachosa123
 
PPTX
GitHub_Copilot_Basics...........................pptx
ssusera13041
 
PPTX
Presentation on Foundation Design for Civil Engineers.pptx
KamalKhan563106
 
PPTX
ENSA_Module_8.pptx_nice_ipsec_presentation
RanaMukherjee24
 
PPT
04 Origin of Evinnnnnnnnnnnnnnnnnnnnnnnnnnl-notes.ppt
LuckySangalala1
 
PDF
LEARNING CROSS-LINGUAL WORD EMBEDDINGS WITH UNIVERSAL CONCEPTS
kjim477n
 
PRIZ Academy - Change Flow Thinking Master Change with Confidence.pdf
PRIZ Guru
 
IISM Presentation.ppt Construction safety
lovingrkn
 
An Evaluative Study on Performance Growth Plan of ICICI Mutual Fund and SBI M...
PoonamKilaniya
 
Cyclic_Redundancy_Check_Presentation.pptx
alhjranyblalhmwdbdal
 
Hazard identification and risk assessment PPT
SUNILARORA51
 
Sensor IC System Design Using COMSOL Multiphysics 2025-July.pptx
James D.B. Wang, PhD
 
Dolphin_Conservation_AI_txhasvssbxbanvgdghng
jeeaspirant2026fr
 
Fluid statistics and Numerical on pascal law
Ravindra Kolhe
 
Call For Papers - International Journal on Natural Language Computing (IJNLC)
kevig
 
th International conference on Big Data, Machine learning and Applications (B...
Zac Darcy
 
MOBILE AND WEB BASED REMOTE BUSINESS MONITORING SYSTEM
ijait
 
1_ISO Certifications by Indian Industrial Standards Organisation.pdf
muhammad2010960
 
Mining Presentation Underground - Copy.pptx
patallenmoore
 
Natural Language processing and web deigning notes
AnithaSakthivel3
 
POWER PLANT ENGINEERING (R17A0326).pdf..
haneefachosa123
 
GitHub_Copilot_Basics...........................pptx
ssusera13041
 
Presentation on Foundation Design for Civil Engineers.pptx
KamalKhan563106
 
ENSA_Module_8.pptx_nice_ipsec_presentation
RanaMukherjee24
 
04 Origin of Evinnnnnnnnnnnnnnnnnnnnnnnnnnl-notes.ppt
LuckySangalala1
 
LEARNING CROSS-LINGUAL WORD EMBEDDINGS WITH UNIVERSAL CONCEPTS
kjim477n
 

WHONIX OS

  • 2. Content  Introduction  Why WHONIX  Structure of WHONIX  Pros  Cons  Applications  Conclusion
  • 4. Introduction  WHONIX aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processor and more pre- configured with security in mind.  It is a complete operating system designed to be used inside a host operating system. It is Free Software and based on Tor, <<vanilla>>Debian GNU/Linux and security by isolation.
  • 5. Why WHONIX? Security by Isolation  Two parts:  Whonix Workstation – Working with applications  Whonix Gateway – Routing via Tor
  • 6. Cont… Anonymity online through Tor  Whonix relies on the Tor network to protect your anonymity online  All connections are either forced through it or blocked.  Tor protects by bouncing communications around a distributed network of relays run by volunteers all around the world.
  • 7. Cont… Based on Debian  To oversimplify it: Whonix is just a collection of configuration files and scripts.  Anything you can do with “vanilla” Debian GNU/Linux, you can do with Whonix.  Whonix doesn’t break anything and doesn’t stop you from using anything you want.  Ex. Installing xrandr
  • 8. Structure of WHONIX  Distributed as:  Gateway  Workstation  Virtualization engine  VirtualBox  VM runs a check to ensure – software & date and time is up to date
  • 10. Cont…  Workstation  Connected to the gateway  Security by isolation  Tor artefacts – xchat, torchat, gpg encryption, bitcoin software etc.  Gateway  Routing all internet traffic through Tor  Not recommended to use for anything else than a gateway
  • 11. Cont…  User applications therefore have no knowledge of the user’s “real” IP address, nor do they have access to any information about the physical hardware.  In order to obtain such information , an application would have to find a way “break out” of VirtualBox, or to subvert the Gateway.
  • 17. Cont…  The Gateway VM  Running Tor  Virtual network interfaces  One of it is connected to outside Internet on VM Host (Tor relays)  Other connected to virtual LAN (Runs inside host)  The Workstation VM  Running user applications  Internal virtual LAN communicate with Gateway  Forces all traffic coming from workstation to pass through Tor  Workstation VM can “see” only IP addresses on the Internal LAN
  • 18. Cont…  The web browser pre-installed in the Workstation VM is the modified version of Mozilla Firefox provided by the Tor as part of its Tor browser package.  This Browser has been changed to reduce the amount of system specific information leaked to Web servers.
  • 20. Pros.  All applications, including those, which do not support proxy settings, will be routed through Tor  Java / Javascript / flash / Browser Plugins / misconfigured applications cannot leak your real external IP  Hide your IP address  Prevent your ISP from spying on you  Prevent websites from identifying you
  • 21. Cont…  Prevent malware from identifying you  Whonix does even protect against root exploits(Malware with root rights) on the workstation  Best possible Protocol-Leak-Protection and Fingerprinting-Protection  Circumvent censorship
  • 22. Cons…  Whonix is produced independently from the Tor anonymity software and carries no guarantee from the Tor Project about quality, suitability or anything else.
  • 25. Conclusion  A free and open Operating System  An anti-censorship tool  The first step among many in hiding your identity  The best thing to hide your identity  A complete operating system designed to be used inside host operating system.  It is free software and based on Tor, Debian GNU/Linux and security by isolation
  • 26. Footnotes/References  https://techrepublic.com/blog/smb-technologist  https://www.whonix.org/wiki/About  https://www.torproject.org/about/overview.html.en  https://anonymous-proxy-servers.net/forum