Whonix Research

From Whonix
< Dev
Jump to navigation Jump to search

Researchers working with us:

keystroke obfuscation[edit]

Vinnie Monaco, the author of the paper Obfuscating Keystroke Time Intervals to Avoid Identification and Impersonationarchive.org has written kloak - Obfuscate keystroke timings to help protect privacyarchive.org due to Whonix requestarchive.org. It is now pre-installed by default in Whonix.

TCP ISN CPU Information Leak Protection tirdad[edit]


TCP ISNs and Temperature induced clock skews[edit]

Ethan White, the author Practical deanonymization using CPU load covert channelsarchive.org helping us with CPU-induced latency Covert Channel Countermeasures.

TODO: https://phabricator.whonix.org/T530#10274archive.org

single-gw multiple-ws vs multiple-gw multiple-ws mapped 1:1[edit]

Tor Project research wanted blog post on single-gw multiple-ws vs multiple-gw multiple-ws mapped 1:1 in progress

See Also[edit]

If you found that interesting, you might also like the following pages.

We believe security software like Whonix needs to remain open source and independent. Would you help sustain and grow the project? Learn more about our 12 year success story and maybe DONATE!