Jump to: navigation, search

Computer Security Education

(Redirected from Microphone)

Introduction[edit]

General[edit]

Whonix, with its default settings, may provide better protection than Tor alone. Higher levels of security can be achieved depending on how much you are willing to invest in security practices and procedures. See Documentation.

Safer Upgrades[edit]

If you already have Whonix installed, before performing an upgrade to your current Whonix setup, you are advised to shutdown any running Whonix instance currently attached to the internal virtual network named 'Whonix'. This is required to prevent cross contamination of the new machines you are importing, in the event that a powerful adversary has taken control over the ones currently in use.

Note: This is not required if you intend to create a new virtual network for the machines you are importing.

Tor Browser Bundle[edit]

It is recommended that you always have the latest release of Tor Browser Bundle installed on your host.

The Tor Browser Bundle is great for testing, whether you live in a censored or not and if Tor is blocked by your ISP or not. If you need (private) or (obfuscated) bridges for the Tor Browser Bundle, you will also need them for Whonix. (See Bridges.)

If the Tor Browser Bundle fails to work on your system, Whonix will similarly fail to work. If the Tor Browser unexpectedly stops running in Whonix, you can still use the Tor Browser independently to visit the Whonix Homepage.

Host Security[edit]

Malware[edit]

The integrity of the host is a critical part of the system's Trusted Computing Base. If the host system is compromised by Malware[1] so is every virtual machine with Whonix, Tor and all anonymous communication. Malware can see your desktop, everything you type, send and receive. Antivirus products and personal firewalls[2] are NOT drop in solutions for a secure host. Malware can often stay undetected and application level personal firewalls are often circumvented [3]. Polymorphic code[4] and Rootkits[5] essentially render Antivirus products helpless. [6] [7]

The optimal scenario is to not get infected by Malware in the first place. Once malicious code has accessed a system, it is next to impossible to contain. In case of sophisticated and targeted attacks, the Antivirus software is not only completely useless but can serve as a pathway to exploiting a system's kernel (since they almost always run with admin privileges).[8] Some antivirus software also harms your privacy by sending files on your system back to company servers for analysis.

This is not to say that Antivirus scanning and firewalls are totally useless, however, it is difficult to take advantage of antivirus scanning since a secure setup is very impractical, cumbersome. For more information on that, see the following footnote. [9]

Refer to antivirus not as your first but as your very last line of defence. If you do find malware on your system, this only demonstrates that your precautions didn't work. It is the precautions (hardening, secure host operating system, signed software) that are of most importance not the detection.

Using a dedicated host operating system[edit]

It is recommended that you use a dedicated host operating system just for hosting Whonix Virtual Machines. Should your every day operating system already be compromised, Whonix could not provide any additional protection. It's best to have one dedicated host operating system which is used to only host Whonix.

Using Whonix on External Media[edit]

Unfortunately, Whonix does not provide a user friendly USB creator (help welcome!). However, you can install the host operating system(s) required for Whonix on (encrypted) a dedicated external disk(s) such as USB, FireWire, eSATA, etc for futher security. This will reduce the risk of other operating system(s) infecting Whonix's host operating system. You can remove and hide the Whonix disk(s) while they are not in use.

There are a number of guides online explaining how to install Linux on USB. Whonix differs only in that you must install a supported virtualizer and Whonix.

Using your own host[edit]

It is recommended that you only use Whonix on computers you own with no sharing privileges. While other users may be trusted, they might not be equally knowledgeable in computer security. Only one mistake is required for your system to be compromised.

Needless to say, hosting Whonix on your cloud, on a foreign server you do not physically control, on a VPS etc is not recommended. Information on these systems is readily accessible to their owners/regulators.

Using a dedicated host computer[edit]

For the ultimate host security option you should use a dedicated computer just for hosting Whonix. Ideally one, that you never used for anything else before.[10]

Firmware Updates[edit]

This chapter contains general security advice and is unspecific to Whonix.

Due to the hardware and host operating system specificity and difficulty of this topic, it is outside the scope of Whonix documentation. The links provided may not be the most relevant and you may have to research this topic further on your own.

This includes BIOS updates, non-free drivers or firmware and processor microcode updates (on Debian systems, depending on your processor, either the intel-microcode or the amd-microcode package).

Updating firmware may or may not improve security. On one hand you may fix vulnerabilities. On the other hand, an update may introduce a new backdoor. If you know of examples of one of these situations, feel free to edit this chapter. As an end user, you unfortunately have to blindly trust the hardware producer anyway, so it might be better to get the non-Free updates.

(See also the thread on the debian-security mailing list How secure is an installation with no non-free packages?)

Using Libre Software Hardware[edit]

This chapter contains general security advice and is unspecific to Whonix.

Open-source hardware is not affected by the non-Free firmware updates issue described above. Such hardware might be more trustworthy. (The Lemote Yeeloong Notebook maybe?)

TODO: research and expand

Host Operating System[edit]

Windows Hosts[edit]

GNU/Linux is the only serious option for having a private host operating system. You can stop reading this windows chapter here or go on reading to find out why.

If you want to just use your system without harassment (advertisements, forced updates, remotely removing applications without your consent) and surveillance then its worth investing comparably less effort in learning Linux instead of playing whack-a-mole with malware on your system by people who wrote it.

By using any version of Windows, you completely forfeit your privacy by using this OS. An anonymous browser or OS is of little help when the host is compromised and sends info about what you type or download to a third party. The trustworthiness of the host is a crucial part of any threat model. Windows is also bundled with a large number of programs that 'phone home' by default.[11]

Additional privacy risks have been introduced with Windows 8. One example is the smartscreen filter, which reports to Microsoft what software you are running on your computer. [12] This feature includes a kill switch that can allow Microsoft (or any one with an exploit for this mechanism) to delete programs on your machine without your consent. [13]

Windows 10 takes surveillance of users to a whole new level. It runs a telemetry spyware program out-of-the-box that snoops on the users' files, what programs you are running and for how long, text input including your unique typing pattern[14], voice input, location info, contacts, calendar records and web browsing history, as well as automatically connecting the machines to open hotspots and showing targeted ads. There is no way to remove telemetry. Know that with non-enterprise editions you have no way to completely opt-out of the surveillance "features" of Windows 10.[15] Even if you can tweak some settings you cannot trust that they will be respected because they forced code on user's machines despite turning off windows updates many times before [16][17][18][19] [20]

Microsoft has been aggressively and deceptively forcing Windows 10 on users get people to run the spyware.They backported it to Windows 7 and 8 for those that held back so odds are you are already running it.[21] Even if you "disable" windows update on windows 7 and 8 Microsoft is still able to modify the system. For more details about Windows malicious behavior check the factual write-up.

Ignoring for a second its own built-in malware, Windows is a pile of legacy code full of security holes thats easily compromised. Before patching Windows, Microsoft is known to consult with intelligence agencies and provide information on security holes before they inform the public and fixes are produced.[22] Since the NSA also buys security exploits from software companies [23] and uses them to gain unauthorized access into computer systems, [24] it is reasonable to assume that the NSA also uses information supplied by Microsoft and that Windows users are at a higher risk.

Microsoft updates use weak cryptographic verification such as MD5 and SHA-1. The CMU Software Engineering Institute said about MD5 in 2009, it "should be considered cryptographically broken and unsuitable for further use". [25] In 2012, the Flame malware exploited the weaknesses in MD5 to fake a Microsoft digital signature. [26]

Open Source software like Linux is more secure than closed source software like Windows. The public scrutiny of security by design has proven to be superior to security through obscurity. This aligns the software development process with Kerckhoffs' principle - the basis of modern cipher-systems design. The system must be secure even if the enemy knows everything about how it works.

Mac OS-X Hosts[edit]

There are many problems with Apple's OSes including surveillance, censorship of what programs you can run and DRM crippleware to limit what you can do with your devices. See this write-up by the FSF for more information.[27]

GNU/Linux Hosts[edit]

A Free Software OS that respects user freedom, is the only realistic choice when it comes to privacy and security.

Use GNU/Linux on the host and only using in-repository software is automatically gpg signed and installed from the distributor's repositories by the package manager. This is much safer than downloading stuff from the web like you have to do as a Windows user.

Which GNU/Linux Distribution do you recommend?[edit]

Debian GNU/Linux is recommended. For extra security tips for download, verification and installation see Debian Tips.

It used to be that any GNU/Linux distribution is a safe bet with privacy however Ubuntu's data-mining functionality makes it an unsuitable choice.[28]

For other reasons not to use Ubuntu or Ubuntu-derived distros expand this section.

Ubuntu's paltry contributions to the upstream libre projects they rely on so much is a policy not a coincidence with "It's absolutely true we have no interest in the core fundamentals of the Linux kernel, none whatsoever." - Mark Shuttleworth (Canonical founder).[29]

The only time they bother contributing in any major way is when forking major projects (Wayland into Mir and GNOME into Unity - both which cannot be built without major effort on any other distro but their's)[30] in attempt to fragment the open source software stack to lock in users and put pressure on competing distros and vendors.[31][32]

Their Contributor License Agreement gives them complete power over patents that cover contributed code and grants them the right to re-license this code under any license of their choice including a proprietary one.

Hostile treatment of Kubuntu spin project lead and unilaterally removing him without warning and contrary to wishes of his team members.[33] Canonical also pilfered donation funds originally meant for desktop spin projects (Kubuntu, Lubuntu...) despite abruptly dropping funding in Kubuntu's case and Blue Systems stepped in to save the popular project.[34][35] For years Canonical has been applying an absurd intellectual property policy over packages in its repositories - claiming it owns the copyright over any binaries compiled by their servers. After the FSF stepped in and arranged a resolution over 2 years, the amended policy now states that Canonical’s IP policy can’t override packages with GPL licenses, but that now means that any package with a permissive license is now copyrighted by them.[36][37]

You cannot rely on downstream forks based on Ubuntu either - The popular Linux Mint distro was threatened to be cut off from accessing Ubuntu infrastructure unless they caved in to Canonical's binary licensing terms.[38] Since then they put out a version based on Debian instead. Their vague trademark and IP policy has become radioactive for downstream distros and many have made the smart choice to re-base on Debian instead of Ubuntu over the years including Kali, Whonix and others.[39]

Canonical is getting snugly with Microsoft which should make you uncomfortable given the latter's strategy of Embrace, Extend, Extinguish of Free Software.[40]

There are of course other options. See "Why don't you use <your favorite most secure operating system> for Whonix?" for analysis of alternatives.

LAN/Router Security[edit]

If your Whonix-Gateway is ever compromised, it can theoretically access any computer in your local network. Therefore, if you are the administrator of your home network, it's recommended that you lock down the web interface of your home router, i.e. installing the latest firmware with latest security patches and using a secure password.

Host Firewall[edit]

Having a simple host firewall (gufw - Uncomplicated Firewall[41] on Debian), denying all incoming ports, is recommended as well.

On the host, on Debian.

1. Install gufw.

sudo apt-get update && sudo apt-get install gufw

2. Start gufw

gufw

3. Press unlock. Enter password.

4. Press enable.

5. Settings: Incoming: Deny Outgoing: Allow

Disable TCP Timestamps[edit]

Adversaries can remotely access the current uptime of your machine and the host's clock-down to millisecond precision. To avoid this information being passed, it is recommended that you disable TCP timestamps on your systems. The less information attackers can get, the higher the security.

Qubes[edit]

If you are using Qubes R3.1 or above, then there is nothing to do since this is the Qubes R3.1 and above. [42] Otherwise you should upgrade the latest stable Qubes version.

Linux[edit]

[43]

Open a terminal (Konsole).

Become root.

sudo su

You need to add the following line to /etc/sysctl.d/tcp_timestamps.conf:

net.ipv4.tcp_timestamps = 0

To do that, you could use the following command.

echo "net.ipv4.tcp_timestamps = 0" > /etc/sysctl.d/tcp_timestamps.conf

To apply the sysctl settings without reboot, run the following command.

sysctl -p

Check if it's really set.

sysctl -a

If it worked correctly, the system should respond the following: net.ipv4.tcp_timestamps = 0

Windows[edit]

To disable TCP timestamping on Windows, run the following root command:

netsh int tcp set global timestamps=disabled

Note: You must have administrator privileges.

Other Operating Systems[edit]

TODO

Disable ICMP Timestamps[edit]

Qubes[edit]

This will be the default in Qubes 3.1 and above.

Linux[edit]

ICMP Timestamps need to be blocked using your firewall. This is distro dependent and varies widely as does having a firewall enabled on your specific OS - some distros don't turn it on. There are many differing ways to accomplish this via command-line, its recommended to consult your distro's documentation.

Instead for a more straightforward way, you advised to download a GUI front-end to configure your firewall and have it set to silently drop all incoming connections by default, allowing only outgoing traffic from your machine.

Other Operating Systems[edit]

TODO: document.

Microphone[edit]

Does your computer or notebook have a microphone? You could have a built-in one, but never noticed it. In most cases it is recommended to disable your microphone for security reasons. If your Whonix-Workstation ever gets compromised by malware, an adversary could eavesdrop through your microphone. It is save to assume, that everyone has have a unencrypted phone call during ones life time and that one of them has been recorded.

Voice and writing is very personal, unique so your non-anonymous and "anonymous" voice can be easily linked. This is called voice recognition and documented on the VoIP wiki page in the introduction chapter. (For writing this technique is called stylometry and documented on the Surfing Posting Blogging wiki page.)

External microphones should be unplugged for ultimate security. If your microphone is built-in and you decide to disable your microphone, you can check the BIOS see find out if the microphone can be disabled. Removing built-in microphones may be a bit more difficult, but if you have the skills to remove it, go for it.

By default, unfortunately microphones connected to your host are available to virtual machines such as the Whonix-Workstation.

If you want to make internet calls, Voice over IP (VoIP) or use the microphone for other reasons inside Whonix-Workstation, use Multiple Whonix-Workstations and use the microphone only in selected, not all Whonix-Workstations. Unplug your microphone after use.

For VoIP purposes you may need to enable audio passthrough capability for your respective hypervisor. This page documents the steps on getting audio working on supported platforms.

Expand for more information:

KVM[edit]

KVM by default emulates a line-in/line-out in the virtual sound device, meaning microphone passthrough to guests is enabled if its turned on for the host.

VirtualBox[edit]

VirtualBox does not yet have a feature to disable microphones inside virtual machines.[44] Mute it on your host.

Qubes[edit]

As per the usual Qubes feature.

Qubes VM Manger -> Right click on VM -> Attach/deattach audio input device to the VM

Webcam[edit]

Does your computer or notebook have a webcam? You could have a built-in one, but just never noticed - check your computer's datasheet and operating system hardware manager.

Unless you plan to use a webcam inside Whonix-Workstation, it's recommended to disable or possibly remove your webcam. If you do plan to use a webcam you should disable and possibly unplug your webcam after use.

External webcams should be unplugged for optimal security. If your webcam is built-in and you decide to disable it, you can check the BIOS to find out if the webcam can be disabled. Removing built-in webcams may be a bit more difficult, but if you have the skills to remove it, go for it. Alternatively, cover the webcam externally.

Wireless Input Devices[edit]

Avoid using wireless keyboards and mice because most send data unencrypted. Even if this wasn't the case, there is no way to verify the robustness of the crypto involved in proprietary products. A local adversary (up to 100 meters away) can sniff keystrokes and inject their own, allowing them to take over the machine.[45][46]

Backups[edit]

Backups of sensitive data is important. Data where you do not posses at least two copies of the original should be considered lost. This is because one data medium might become inaccessible beyond repair any minute. So your computer would not even detect the risk anymore, so data recovery tools would not be of help either. (In such cases you might be lucky with professional data recovery companies, but they usually charge thousands or dollars.)

So this is what is recommended:

  • original file on medium such as your internal harddrive.
  • backup one. Example: on an external hardrive my manufactor A.
  • backup two. Example: on an external harddrive by manufactor B.

For better security for other events such as fire or physical access such as robbery, backups in separate physical locations are recommended. Additionally backups at remote servers are also an option, but then you really must make sure to get the encryption right.

Whonix information[edit]

MAC Address[edit]

Introduction[edit]

All network cards, both wired and wireless, have a unique identifier stored within them called their MAC address[47]. This is used to assign an address to your computer on the local network. This address is not traceable (as in it isn't passively sent to computers beyond your local router).[48]

However, other computers on the local network could log it, which then would provide proof that your computer has been connected to that network. If you are using an untrusted, public network you should consider spoofing[49] it.

IMPORTANT NOTE: According to recent research[50] , MAC address spoofing is not effective against advanced tracking techniques that can still enumerate it by looking at physical characteristics of the Wi-Fi card. Manufacturers need to modify their hardware's drivers or firmware to add privacy preserving mitigations.

A workaround is to buy new "burner" WiFi USB sticks of different brands. Take care to disable your machine's native WiFi functionality in the BIOS because odds are its characteristics are already logged if you used it from any untrusted hotspot. Enable connectivity with these burner devices only from the intended public destination. At no point should you use them to connect from a network tied to you or a place you regularly visit. Use a different stick for every new location to avoid location profiling/tracking.

Dealing with MAC Addresses is one piece of the puzzle of the location tracking problem. Attention must be given to changing the usual entry guards you connect to - for every Tor instance on your machine host (apt-transport-tor) and guest to thwart this type of attack.

Using your home connection[edit]

Changing your MAC address is not required. However, when not using a VM your physical MAC address could be revealed in the case of a browser exploit. If you are already under suspicion, this would eventually provide proof of your identity. When the MAC address has been changed, root access is required to discover the real physical address. (Note: This is yet to be tested)

Consider: If your home network uses a cable modem internet connection, the ISP either provides the cable modem device as part of the service or requires pre-registration of the MAC address of your self-provided cable modem in order to setup your service. If you manage to hack/change the MAC address of the modem, your service would immediately cease functioning (because the IP assignment is apportioned for, and bound to, that specific MAC address). As a result, when connecting from behind a cable modem/NAT router, spoofing the MAC address of your PC's ethernet adapter may be pointless. If you are traced, the trackable endpoint will be the MAC address of your cable modem device.

Using a public computer (e.g. in a library, Internet-cafe)[edit]

The MAC address should not be changed, as it may bring undesired admin attention to your service and/or simply forbid your access to the Internet.

Using a personal computer (e.g. a laptop, wherever it happens) in a public network[edit]

The MAC address should be changed, and /var/lib/tor/state should be removed so that a new set of guards is selected.

It is advisable that the admin not discover the use of Tor on your computer. This depends on your configuration, i.e. perhaps you are using obfsproxy or you tunnel your traffic through SSH/VPN.

Changing the MAC address and being a Tor user, depending on your personal threat model, might be risks for re/visiting that public network.

If you are going to reuse the same public network, you have to decide, if you are going to use the very same MAC address (and set of guards) or if you are going to create a new MAC address. If you suspect that the admin has seen you and logged the MAC, it could be unwise to change the MAC address, since this could be appear suspect. If you believe that public network is adequately public and that you have not bee observed, you might decide to use a new MAC address (popular vendor ID, random/unique second part) each time you use this network.

For more discussion on this rather difficult topic, see Dev/MAC.

Random MAC address[edit]

Using a random MAC address is not recommended. While this might sufficiently confuse some adversaries, it will not defeat skilled adversaries. If you are using a random MAC address, it might happen that the vendor ID of the MAC address is non-existent. Even if it was existent, you might end up with a vendor ID, which has either never been used or not been used in decades. If you are going to spoof your MAC, you have to use a popular vendor ID.

The initial second part of the MAC address may be random/unique.

As yet, we cannot provide detailed instructions on how to create such appropriate MAC addresses. Research is still ongoing.

The reason why MAC changing is not always enabled is that it might cause problems on some networks.

Auto-connect issue[edit]

Apart from the difficulty creating an appropriate MAC address, there are also technical hurdles. All the work of creating this MAC will be futile if you boot your computer and it instantly connects to the public network and spills your MAC address. For Virtual Machine users: your host operating system most likely automatically connects (updates, perhaps time sync). For Physical Isolation users: Whonix-Gateway automatically connects to Tor after start.

Also if you use a USB WiFi device, this might also occur.

Changing MAC address[edit]

For Qubes Hosts[edit]

Qubes users do this in their NetVM. Refer to the Qubes documentation / support. See:

For Linux Hosts[edit]

If you are interested in this with Non-Qubes-Whonix, please press on expand on the right.

Non-Qubes-Whonix means all Whonix platforms except Qubes-Whonix. That includes KVM, VirtualBox and Physical Isolation.

TODO: test and expand, please help!

(1)

Standard-Download-Version (Virtual Machine) users

Edit /etc/network/interfaces on the host.

Physical Isolation users

Edit /etc/network/interfaces on Whonix-Gateway

(2)

Get Macchanger

apt-get update && apt-get install macchanger

(3)

Changing MAC

If instructions 1+ below don't work, you can use the following to manually change the MAC address for your device (eth0, wlan0, etc.):

ifconfig wlan0 down
macchanger -a wlan0
ifconfig wlan0 up
This might also work without macchanger:
ifconfig wlan0 down
ifconfig wlan0 hw ether 00:AA:BB:CC:DD:EE
ifconfig wlan0 up
Or, using iproute2 commands:
ip link set down wlan0
ip link set wlan0 address 00:AA:BB:CC:DD:EE
ip link set up wlan0

(4)

Below "iface eth0 inet dhcp" Add

hwaddress ether 00:00....
(5)

To automatically randomize the MAC address on boot, if desired, add

pre-up macchanger -e eth0

(6)

To prevent automatically bringing up new network interfaces, all that is needed is to uncomment.

auto eth0

Then manually bring up with

sudo ifup eth0

Sources[edit]

See footnote. [51]

Known bugs[edit]

Check Download page for a list of known bugs.

Most Security[edit]

If you want to learn all of the security concerns that Whonix considers you should, before installing Whonix, read all Whonix Documentation pages. Depending on your security needs, you might also like to consult the Design pages.

What's next?[edit]

After reading and applying Computer Security Education, download, verify and install Whonix. Then read and apply Post Install Advice.

References[edit]

  1. https://en.wikipedia.org/wiki/Malware
  2. https://en.wikipedia.org/wiki/Personal_firewall
  3. https://www.grc.com/lt/leaktest.htm
  4. https://en.wikipedia.org/wiki/Polymorphic_code
  5. https://en.wikipedia.org/wiki/Rootkit
  6. http://arstechnica.com/security/2014/05/antivurus-pioneer-symantec-declares-av-dead-and-doomed-to-failure/
  7. A botnet authors was even writing undefeatable malware and trolling antivirus vendors.
  8. https://theintercept.com/2015/06/22/nsa-gchq-targeted-kaspersky/
  9. You would have the antivirus software being installed a separate system where you have the assumption, that it is less likely of being already compromised.
    • To a degree external HDDs (such as USB or eSATA) may be useful. Sophisticated malware may compromise the for example the physical USB stack, so when booting from USB, the malware would again disable the detection by the antivirus. Also see the following blog post, USB Security Challenges. This is why Qubes OS encourages users to move the USB controller into a separate VM so the USB controller is not exposed to the host so a compromised USB controller does not compromise the whole system.
    • The most precautions way to scan a disk is to physically remove it from the computer where it was being used. Then put it into an external disk enclosure. Put the disk controller into a separate VM. Practically for now, probably only using Qubes with a USBVM. Then connect the disk to that (USB) disk controller. Hope that by reading that disk not another hypothetical exploit will compromise your scanning system. That way you could scan a disk with relative security that the not-yet-compromised scanning computer does not get compromised.
  10. To reduce risks of eventual previous hardware compromised.
  11. https://trac.torproject.org/projects/tor/wiki/doc/TransparentProxyLeaks#Windows
  12. http://log.nadim.cc/?p=78
  13. http://www.pcmag.com/article2/0,2817,2400985,00.asp
  14. http://www.pcworld.com/article/2974057/windows/how-to-turn-off-windows-10s-keylogger-yes-it-still-has-one.html
  15. https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive
  16. https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263
  17. https://archive.fo/LffTy
  18. http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/
  19. http://voices.washingtonpost.com/securityfix/2007/09/microsofts_stealth_update_come.html
  20. http://www.zdnet.com/blog/hardware/confirmation-of-stealth-windows-update/779
  21. http://www.theregister.co.uk/2015/09/01/microsoft_backports_data_slurp_to_windows_78_via_patches/
  22. https://www.techdirt.com/articles/20130614/02110223467/microsoft-said-to-give-zero-day-exploits-to-us-government-before-it-patches-them.shtml
  23. https://threatpost.com/nsa-bought-exploit-service-from-vupen-contract-shows/102314
  24. http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity
  25. https://en.wikipedia.org/wiki/MD5#cite_note-11
  26. http://arstechnica.com/security/2012/06/flame-crypto-breakthrough/
  27. https://fix-macosx.com/
  28. https://fixubuntu.com/
  29. http://www.theinquirer.net/inquirer/news/2168086/canonical-linux-kernel
  30. https://ask.fedoraproject.org/en/question/25127/how-to-build-unity-in-fedora/
  31. http://mjg59.dreamwidth.org/25376.html
  32. http://www.linux-magazine.com/Online/Blogs/Off-the-Beat-Bruce-Byfield-s-Blog/Mir-vs.-Wayland-show-why-upstream-projects-matter
  33. https://kver.wordpress.com/2015/05/27/making-sense-of-the-kubuntucanonical-leadership-spat/
  34. http://www.pcworld.com/article/2998647/operating-systems/kubuntus-founder-resigns-accuses-canonical-of-defrauding-donors-and-violating-copyright.html
  35. https://lists.ubuntu.com/archives/kubuntu-devel/2012-February/005782.html
  36. https://www.fsf.org/news/canonical-updated-licensing-terms
  37. http://mjg59.dreamwidth.org/37113.html
  38. https://forums.linuxmint.com/viewtopic.php?t=152450
  39. https://mjg59.dreamwidth.org/45939.html
  40. http://www.zdnet.com/article/microsoft-and-canonical-partner-to-bring-ubuntu-to-windows-10/
  41. https://en.wikipedia.org/wiki/Uncomplicated_Firewall
  42. https://github.com/QubesOS/qubes-issues/issues/1344
  43. temporary You can skip this Temporary chapter and move on to #Permanently if you are looking for a permanent solution. To dynamically disable TCP timestamping on Linux... (When using Qubes: in the NetVM.) Become root.
    sudo su
    Disable TCP timestamping.
    echo 0 > /proc/sys/net/ipv4/tcp_timestamps
  44. https://www.virtualbox.org/ticket/12026
  45. https://www.schneier.com/blog/archives/2016/03/security_vulner_6.html
  46. https://www.schneier.com/blog/archives/2016/08/security_vulner_7.html
  47. https://en.wikipedia.org/wiki/MAC_address
  48. Unless your computer is infected with Malware looking for this number.
  49. https://en.wikipedia.org/wiki/MAC_spoofing
  50. Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms

License[edit]

Whonix Computer Security Education wiki page Copyright (C) Amnesia <amnesia at boum dot org>
Whonix Computer Security Education wiki page Copyright (C) 2012 -2014 Patrick Schleizer <adrelanos@riseup.net>

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.

Random News:

We are looking for maintainers (developers).


Impressum | Datenschutz | Haftungsausschluss

https | (forcing) onion
Share: Twitter | Facebook | Google+
This is a wiki. Want to improve this page? Help welcome, volunteer contributions are happily considered! See Conditions for Contributions to Whonix, then Edit! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation. Whonix (g+) is a licensee of the Open Invention Network. Unless otherwise noted above, content of this page is copyrighted and licensed under the same Free (as in speech) license as Whonix itself.