Researchers working with us:
Vinnie Monaco, the author of the paper Obfuscating Keystroke Time Intervals to Avoid Identification and Impersonation has written kloak - Obfuscate keystroke timings to help protect privacy due to Whonix ™ request. It is now pre-installed by default in Whonix ™.
TCP ISNs and Temperature induced clock skews
Ethan White, the author Practical deanonymization using CPU load covert channels helping us with CPU-induced latency Covert Channel Countermeasures.
single-gw multiple-ws vs multiple-gw multiple-ws mapped 1:1
Tor Project research wanted blog post on
single-gw multiple-ws vs multiple-gw multiple-ws mapped 1:1 in progress
- Dev/Multiple Workstations
TCP ISN CPU Information Leak Protection tirdad
If you found that interesting, you might also like the following pages.
- Advanced Deanonymization Attacks
- Dev/Advanced Deanonymization Attacks
- What we do, Things the Whonix ™ project is working on; Innovate; Cooperate; Mentor; Educate; Maintenance