Researchers working with us:
Vinnie Monaco, the author of the paper Obfuscating Keystroke Time Intervals to Avoid Identification and Impersonation [archive] has written kloak - Obfuscate keystroke timings to help protect privacy [archive] due to Whonix ™ request [archive]. It is now pre-installed by default in Whonix ™.
TCP ISNs and Temperature induced clock skews
Ethan White, the author Practical deanonymization using CPU load covert channels [archive] helping us with CPU-induced latency Covert Channel Countermeasures.
single-gw multiple-ws vs multiple-gw multiple-ws mapped 1:1
Tor Project research wanted blog post on
single-gw multiple-ws vs multiple-gw multiple-ws mapped 1:1 in progress
- https://phabricator.whonix.org/T567#11239 [archive]
- https://lists.torproject.org/pipermail/tor-dev/2016-December/011720.html [archive]
- Dev/Multiple Workstations
TCP ISN CPU Information Leak Protection tirdad
- https://bitguard.wordpress.com/?p=982 [archive]
- https://github.com/Whonix/tirdad [archive]
- https://github.com/0xsirus/tirdad [archive]
If you found that interesting, you might also like the following pages.
- Advanced Deanonymization Attacks
- Dev/Advanced Deanonymization Attacks
- What we do, Things the Whonix ™ project is working on; Innovate; Cooperate; Mentor; Educate; Maintenance