Advanced Security Guide Introduction
Jump to navigation Jump to search
Whonix ™ comes with many security features . Whonix ™ is Kicksecure ™ hardened by default and also provides extensive Documentation including a System Hardening Checklist. The more you know, the safer you can be.
This page is targeted at advanced users who wish to improve the security of their systems to become even more secure.
Before reading or applying instructions in the Advanced Security Guide, first review the information found in the Computer Security Education and Basic Security Guide sections.
It is recommended to learn more about the following topics:
- Anonymizing MAC Addresses: Readers interested in this topic can also read the development discussion and draw their own conclusions.
- Connections between Whonix-Gateway ™ and Whonix-Workstation ™
- Restrict TransPort: This is explained under Whonix-Workstation ™ is firewalled
- Stream Isolation
- Time Attacks
- Whonix ™ Design: Technically-minded readers can review the recommendations on how less-than-ideal specifications could be improved.
- Whonix ™ Documentation: Some application-specific documentation will have no relevance, but a thorough study of various entries will increase overall awareness and gradually improve anonymity and security practices.
Useful External Links
- Debian Security Information
- Debian / Ubuntu Linux Install Advanced Intrusion Detection Environment (AIDE) Software 
- Linux Administrator's Security Guide
- Linux Server and Network Security
- Securing Debian Manual
- What steps do you take to secure a Debian server?
- Ubuntu documentation - Antivirus
- Ubuntu wiki - Basic Security 
- Ubuntu wiki - Did I Just Get Owned?
- ↑ See also: AIDE Debian package and the AIDE homepage.
- ↑ Since Ubuntu is based on Debian.