[tor-talk] Whonix ALPHA 0.4.5 - Anonymous Operating System released
adrelanos at riseup.net
Tue Oct 9 19:46:18 UTC 2012
-----BEGIN PGP SIGNED MESSAGE-----
Whonix ALPHA 0.4.5 is now out.
Whonix (called TorBOX or aos in past) is an anonymous general purpose
operating system based on Virtual Box, Debian GNU/Linux and Tor. By
Whonix design, IP and DNS leaks are impossible. Not even malware with
root rights can find out the user's real IP/location.
This is because Whonix consists of two (virtual) machines. One machine
solely runs Tor and acts as a gateway, which we call Whonix-Gateway.
The other machine, which we call Whonix-Workstation, is on a
completely isolated network. Only connections through Tor are possible.
This is only a very brief introduction. See Security  for a more
comprehensive description, security features and threat model.
Whonix is produced independently from the Tor (r) anonymity software
and carries no guarantee from The Tor Project about quality,
suitability or anything else.
Applications: Can torify almost any application safely.  
Bridges: (Private) (obfuscated) bridges can be used the same way
they could be used with vanilla Tor. 
VPN/Tunnel Support: combining Whonix with VPNs, proxies or ssh in
any combination is possible. 
Hidden Service Support: You can provide any kind of hidden service
with a greatly reduced risk for IP leaks. 
Windows Support: Whonix-Gateway can also torify Microsoft Windows or
any other operating system. 
Flash Support: Although recommend against Flash, people point
Mozilla Firefox, Flash and socksifier at their feet and pull the
trigger. Whonix is currently the safest method to use Adobe Flash. 
Homepage with documentation:
Or a shorter homepage url:
Call for help:
Please test and leave feedback. Since I am currently the only person
developing Whonix, I could need some help.
General content anonymity caution note:
Whonix uses the best of both worlds, the Isolating Proxy concept 
and the Transparent Proxy concept. At the moment there are no known
anonymity leaks or proxy bypass problems. The principal design is less
vulnerable for any kind of leaks. At time of writing (October 2012) I
have been working on the theoretical concept and practical
implementation for 9 months, the basics have been developed by (at
least) three people, adrelanos, smarm and anonymous.  
Although Whonix has been developed with greatest care, a negative,
being leak free or being free form mistakes in the extended project
description , can not be proven. This is Whonix's first release
announcement. I hope skilled people look into the concept and
implementation and fail to find anonymity related bugs.
Virtual Machine images for Virtual Box (.ova) can be downloaded from
The GnuPG signature that signed this email is also the same key that
signs the Whonix sha512 hash files. You can find my gpg key here. 
  
Thanks to the many people who either directly or indirectly
contributed to this project. Thanks to the Free Software community,
the people who write papers and documentation, the Tor developers, the
Tails developers, the Virtual Box developers, upstream developers,
Debian/Ubuntu GNU/Linux developers, Whonix contributors, testers,
people active on mailing lists and so on. Without them, Whonix
wouldn't be possible!
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----
More information about the tor-talk