Researchers working with us:
Vinnie Monaco, the author of the paper Obfuscating Keystroke Time Intervals to Avoid Identification and Impersonation [archive] has written kloak - Obfuscate keystroke timings to help protect privacy [archive] due to Whonix ™ request [archive]. It is now pre-installed by default in Whonix ™.
TCP ISNs and Temperature induced clock skews
Ethan White, the author Practical deanonymization using CPU load covert channels [archive] helping us with CPU-induced latency Covert Channel Countermeasures.
single-gw multiple-ws vs multiple-gw multiple-ws mapped 1:1
Tor Project research wanted blog post on
single-gw multiple-ws vs multiple-gw multiple-ws mapped 1:1 in progress
- https://phabricator.whonix.org/T567#11239 [archive]
- https://lists.torproject.org/pipermail/tor-dev/2016-December/011720.html [archive]
TCP ISN CPU Information Leak Protection tirdad
- https://bitguard.wordpress.com/?p=982 [archive]
- https://github.com/Whonix/tirdad [archive]
- https://github.com/0xsirus/tirdad [archive]
If you found that interesting, you might also like the following pages.
- Advanced Deanonymization Attacks
- Dev/Advanced Deanonymization Attacks
- What we do, Things the Whonix ™ project is working on; Innovate; Cooperate; Mentor; Educate; Maintenance
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to Conditions for Contributions to Whonix ™, then Edit! Edits are held for moderation. Policy of Whonix Website and Whonix Chat applies.
Copyright (C) 2012 - 2020 ENCRYPTED SUPPORT LP. Whonix ™ is a trademark. Whonix ™ is a licensee [archive] of the Open Invention Network [archive]. Unless otherwise noted, the content of this page is copyrighted and licensed under the same Freedom Software license as Whonix ™ itself. (Why?)