Sunday, August 4, 2019

Whonix operating system, while using it make sure you become like a ghost online!

Privacy no longer exists on the Internet. It's true that the IP number is not the personal identity, but 
with the huge amount of information users share minute by minute, it does not take much effort to know something about someone. At the same time, there are applications and services that do not do much to hide your digital identity, unless an objective and critical solution is applied. This solution may lie in a Linux distribution called "Whonix".

Whonix operating system, while using it make sure you become like a ghost online!



Whonix is an operating system that uses the Tor network and virtualization to provide a completely isolated "anonymous" environment, which means that it is impossible for anyone to know who they are.


Any free software that can monitor open connections can help you be anonymous when you're connected to the Internet, but some of these programs share the approximate IP number and location, which may also happen on your computer, smartphone, or tablet. In general, you do not have direct control over the connections that are created, maintained, or terminated, and what they can and can not share.


The equation becomes more complex when unsafe applications appear, or updates are always current for the operating system. There are many options to hide your connection identity, and the Tor network is one of them, but instead of using a simple browser, why not make the entire operating system and every required connection pass through that network?

This is the goal of Whonix, an operating system formerly known as TorBOX. Whonix supports Debian, VirtualBox, and Tor network. what's the idea? Whonix includes two virtual environments: one is Tor that allows you to hide completely and prevent hackers from tracking you, and plays the role of "impenetrable gate", while the Debian system is in a completely isolated network.

The only way that this second environment should pass to the Web is through the Tor access section, where you identify any connection that can be requested by either the same user or an application that does not take precautions to protect the privacy of the user.



 The theory behind Whonix is ​​very good, however, there are some details to be observed. Perhaps the most important is that based on the virtualization system, the maximum security level that Whonix automatically achieves is related to both the original environment security and virtualization security itself, such as Windows and Mac via VirtualBox or Linux via VirtualBox, KVM, or Qubes OS as a third option. For beginners, it is recommended to limit everything to VirtualBox, it is the fastest and easiest.



While you are using this system, you can use whatever programs, servers and contacts you want and as you wish, no one can track you, your DNS is confidential, and even if someone can penetrate you, they can not even get the original IP of your device.


Download link

0 comments:

Post a Comment