Whonix  What is it? + Features and Tips ▷ 2020

From each person’s perspective, according to the technological world and the way of use that we grant to a computer a secure operating system, it is important for any device that we use every day.

For these reasons, we have conducted specific research that can help you understand the quality and safety your equipment requires. In this article, we will show you the different features and operations that Whonix offers you.

Initially we will highlight its definition in a simple and determined way. In this way, you can understand the key parts of this software and the vitality that fulfills in the security area

What is Whonix and what is this Linux distribution for?

Whonix

For one more benefit in safety, come Whonix. On your website https://www.whonix.org/ you can find a very different software that you can use efficiently for your computer. This distribution is based on Debian and Tor, in the same way, being an operating system that has a linked network traffic, but focused on privacy and anonymity.

Whonix it offers multiple advantages in terms of technical safety for each user. Specifically, your service applies the isolation security system, at the same time that Tor takes care of anonymize user routing on the Internet. Definitely, Whonix works through two virtual machines, which are responsible for creating a special protection layer to counteract malwares Y IP address leaks, guaranteeing security to the distribution of information that runs on the computer.

What are the special features that make Whonix one of the most secure OS?

This operating system is considered very secure in accordance with the different advanced security functions and the total respect of the information it possesses.

These are its most notable features:

High Security

This software is based on “Kicksecure”, a Linux distribution that works on the computer to maintain the improved security. Count with one antivirus included with security measures that provide protection against viruses or malware that try to enter the computer.

Whonix brings the “Kernel self-protection configuration”. Its purpose is core hardening, protecting user accounts from Linux against brute force attacks. This setting also has the ability to improve the miscellaneous security, avoiding the separation of user accounts.

Secured information

Thanks to the utility of Tor, the information distributed is kept hidden from other users. Your safety increases with “Protection from information leaks”. Grants through a kernel module called “Tirdad” the ability to oppose CPU, TCP and ISN data leaks, through the Tor service and its anonymization.

Too has defenses against: data loss, search queries on encrypted network traffic, guard discovery, traffic analysis attacks and timing attacks, with the applications “Boot Clock Randomization, sdwdate, Kloak and Vanguard”

Secure accounts and applications

Another of the qualities that this operating system possesses is the “Anonymity, privacy and security settings”. This option allows you to change the settings of newly created and existing user accounts. The applications have a protection system against vulnerabilities called “AppArmor”. By default it has enabled the “Console lock” this option allows restrict the use of the console by any old login method.

How does Whonix work to protect our data?

Whonix-1

The service provided by this software is divided into two virtual machines: workstation machine and gateway machine. Each machine is configured to check that the system is working properly on a daily basis. In particular a work station machine takes care of stay isolated from the internet and be able to operate safely.

While the other machine takes care of open a gateway that connects with the first, giving access to the Internet when necessary. Whonix opt for the support of Tor, acting through a machine as a gateway. Its function is to pass all connections through the Tor network ensuring all distributed data, so that any attacker is unable to access any type of information, and even the specific IP address.

Whonix vs Tor and Tails How is it different from both?

We previously indicated the role of Whonix on a computer, as well as its influence on security and its anonymity service included. However, being developed based on Tor and its similarity to Tails, we will show you one comparison of each of these operating systems and how they differ.

Let’s see below:

The Onion Router

First of all we have The Onion Router. This software was designed for a anonymous browsing communication. Tor consists of three network layers that distribute traffic.

First, it randomly connects to the first layer, bouncing traffic to the second and redirecting it to the third exit layer, wrapping the data in protected encryption. Unlike Whonix that adequately protects the IP address, this operating system does not completely cover anonymity on a computer, since only hides the traffic passing through the Tor network, leaving the remaining information on display.

The Amnesic Incognito Live System

Tails is a special uniqueness software. In comparison with Whonix, your system Linux is also based on Debian. Its function fulfills the objective of granting privacy and security to its users through the traffic of the Tor network, hiding any information that is being used on the computer.

On the other hand, Tails is not specifically installed on a computer, which means that this software is transported via USB or DVD and starts by default when inserted into a computer, that is, the entire operating system is on the USB.

Basic safety tips that you should apply once you install Whonix

To obtain better performance with Whonix, we bring you some safety tips that may be useful after installation:

Change default passwords

To the have the software installed is included automatically default passwords.

Next, we show you the following steps to change this configuration:

  • First open the terminal (Start menu-Applications-System-Terminal), and we log in as root.
  • Then we will see a note which will indicate the user name and passwords to be changed. We click on the option to change the “Root password”And we follow the instructions indicated, we will repeat the same procedure to change the “User password”

Increase the RAM of the virtual machine

If you are operating Whonix-Workstation your system does not require any necessary changes. Unlike Whonix-Gateway, it is ideal to increase the 2048MB virtual RAM RAM for better performance. If you do not have a feasible amount of RAM, you can follow the steps offered by its official website https://www.whonix.org/wiki/Post_Install_Advice

Update Tor

If you necessarily require a Tor browser update, it is vital that you follow each of these steps:

  • First, we open the browser and we click on the main menu.
  • Among the different options that we will see, we click on “reboot to update Tor browser “, it will immediately start downloading the required update.
  • When this process is done, the browser will restart automatically, starting with the new settings.

Network time synchronization

It’s fundamental do not change this setting recommended, since the system clock that is in Whonix is set to UTC for avoid time zone leaks.

Enable sdwdate-gui

This service is recommended for better security, since enabling this setting will allow you to keep informed about the Tor network connection status and sdwdate progress.

If you have any questions, leave them in the comments, we will answer you as soon as possible, and it will surely be of great help to more members of the community. Thank you! 😉

You may be interested:

Leave a Comment