New chapter Vulnerabilities at Install Time in Advanced Security Guide

Latest stable releases sometimes contain vulnerable, remotely exploitable applications that are very likely to be used over untrusted networks that are in a position to run man-in-the-middle attacks.

A new chapter “Vulnerabilities at Install Time” has been added to the Advanced Security Guide that discusses this issue in detail.

Please help research and document sane and effective solutions.

See:
https://www.whonix.org/wiki/Advanced_Security_Guide#Vulnerabilities_at_Install_Time

Thanks to Jason Ayala for revising that chapter!

Patrick Schleizer on sabtwitterPatrick Schleizer on sabgithubPatrick Schleizer on sabfacebookPatrick Schleizer on sabemailPatrick Schleizer on sabblogger
Patrick Schleizer
Developer and maintainer at Whonix
Patrick started developing Whonix, the Anonymous Operating System in 2012, when quickly others joined efforts. He collected experiences working pseudonymous on Whonix for two years, enjoys collaboratively working on privacy preserving software.

Patrick started developing Whonix, the Anonymous Operating System in 2012, when quickly others joined efforts. He collected experiences working pseudonymous on Whonix for two years, enjoys collaboratively working on privacy preserving software.

Posted in Whonix Development News, Whonix Wiki Updates

Legal

Archives

Contribute

Would you like to contribute to the Whonix project?

Contributing can be as easy as sharing the blog over social media, volunteering, or making a monetary donation.

For more ideas on how to get involved see the "Contribute" and "Testers-Wanted" categories.

Thanks!

- Whonix Staff