Dev/research
< Dev
Jump to navigation
Jump to search
Researchers working with us:
keystroke obfuscation[edit]
Vinnie Monaco, the author of the paper Obfuscating Keystroke Time Intervals to Avoid Identification and Impersonation has written kloak - Obfuscate keystroke timings to help protect privacy
due to Whonix ™ request
. It is now pre-installed by default in Whonix ™.
TCP ISNs and Temperature induced clock skews[edit]
Ethan White, the author Practical deanonymization using CPU load covert channels helping us with CPU-induced latency Covert Channel Countermeasures.
TODO: https://phabricator.whonix.org/T530#10274
single-gw multiple-ws vs multiple-gw multiple-ws mapped 1:1[edit]
Tor Project research wanted blog post on single-gw multiple-ws vs multiple-gw multiple-ws mapped 1:1
in progress
- https://phabricator.whonix.org/T567#11239
- https://lists.torproject.org/pipermail/tor-dev/2016-December/011720.html
- Dev/Multiple Workstations
TCP ISN CPU Information Leak Protection tirdad[edit]
- https://bitguard.wordpress.com/?p=982
- https://github.com/Whonix/tirdad
- https://github.com/0xsirus/tirdad
See Also[edit]
If you found that interesting, you might also like the following pages.
- Advanced Deanonymization Attacks
- Dev/Advanced Deanonymization Attacks
- What we do, Things the Whonix ™ project is working on; Innovate; Cooperate; Mentor; Educate; Maintenance