Whonix ™ Protection against Real World Attacks
Whonix ™ helps to protect users against various deanonymization attacks. This chapter lists many notable "in the wild" attacks [archive] that deanonymized users who did not rely on the Whonix ™ platform, but which failed against Whonix ™ due to its fundamental design.
The threats posed by "zero day exploits" are not just a hypothetical concern. Since 2014, the Google Project Zero initiative has discovered a new exploit every 17 days.  Further, a widespread and highly profitable industry [archive] has developed around 0-days, illustrating that all sectors of society are potential targets of the hack-for-hire market, including those involved in politics, advocacy, global commerce and government. Hundreds of commercialized hacking entities have emerged to trade in offensive security, posing threats to individuals and groups who do not have sophisticated cybersecurity resources.
The lack of government regulation in this area should not surprise the reader, since government is one of the largest clients of offensive security companies [archive] in order to bolster their surveillance and espionage capabilities. Government tolerance and perceived normalization for these types of services reinforces the notion that private individuals and organizations must utilize all available measures to better protect themselves.
Real World Attacks
IP leaks [archive](w [archive]) have been reported when using ordinary proxification methods. However, since Whonix ™ prevents information leaks, using BitTorrent will not leak a user's real external IP address (see File Sharing). The reason is Whonix-Workstation ™ (
anon-whonix) has no knowledge of the external, ISP-facing IP address.
Flash and Java
Whonix ™ prevents information leaks from browser plugins since it has no knowledge of the real external IP address. This protection also applies to Flash-based applications used by advanced adversaries [archive]. Nevertheless, it is not recommended to install browser plugins such as Flash when anonymity is the goal.  See Browser Plugins for further details.
A security bug [archive] was reported in Nautilus file manager that allows an attacker to disguise a malicious script as a
.desktop file.  In this attack, an adversary tricks the user into downloading the
.desktop file from a website or sends the file in an email. Once the file is on the target's computer, the file (PDF, ODT) only has to be opened by the user for the script to execute.
This security bug was used to craft an exploit which was able to break the Subgraph OS [archive] security model. Since Subgraph does not contain Nautilus in an Oz sandbox,  once the malicious script was executed, it would have enabled access to much of the user's data; PGP keys, SSH keys, stored email, documents, password databases, MAC addresses and nearby Wi-Fi access points.
This sensitive information could be used by attackers to deanonymize the user,  but Whonix ™ defeats this attack and others like it. Since Whonix-Workstation ™ (
anon-whonix) is isolated from the host and Whonix-Gateway ™ (
sys-whonix), even if a malicious
.desktop script is executed, no information can be gathered about the external IP address, hardware serials or sensitive data outside of Whonix-Workstation ™ (
anon-whonix). Once Subgraph developers were informed of the vulnerability, the Nautilus package was patched on the platform. 
An attack [archive](w [archive]) was published that targets P2P applications in order to trace and profile Tor users. Whonix ™ defeats this attack and others like it because Whonix-Workstation ™ (
anon-whonix) has no knowledge of the external IP address. Furthermore, Whonix ™ provides extended protection by using Stream Isolation.
A bug was found in Pidgin source code [archive] that would have leaked the real IP address.  Whonix ™ did not exist when this bug was discovered. Nevertheless, the security by isolation model adopted by Whonix ™ prevents this kind of leak from occurring. Notably, this bug only existed in the developmental source code and it was patched before the release date.
Targeted Clock Skew Correlation
This type of correlation allows an adversary to acquire the time stamp of an Onion Service http header and measure the skew (clock skewing [archive])(w [archive]). The adversary then compares the acquired time stamp against Tor relays or other publicly reachable web servers. If the time skew of the Onion Service server matches any publicly reachable servers or Tor relays, it is very likely the Onion Service is hosted on the same server.
Whonix ™ defeats this and other time attacks since it uses Boot Clock Randomization and sdwdate. This program connects to a variety of servers (likely to be hosted on different hardware) at random intervals and extracts time stamps from the http headers. Using the sclockadj option, time is gradually adjusted thus preventing bigger clock jumps that could confuse logs, servers, Tor, i2p, etc.  
Tails [archive] reported that Thunderbird leaked [archive](w [archive]) the real external IP address. Although Whonix ™ did not exist when this bug was discovered, it would have been impossible for the real external IP address to leak, since Whonix-Workstation ™ (
anon-whonix) has no knowledge of it. In fairness to Tails, this kind of leak is now considered unlikely since they no longer use transparent torification. 
Tor Browser Bundle
- A severe bug [archive](w [archive]) was discovered in FireFox which related to WebSockets bypassing the SOCKS proxy DNS configuration.  Whonix ™ defeats this bug since Whonix-Gateway ™ (
sys-whonix) forces all traffic through the Tor network or it is blocked. At worst, a proxy bypass would have emitted traffic through Tor's TransPort. In this scenario, the only information that could leak is the IP address of another Tor Exit Relay, which would not affect anonymity.
- TorMoil: A security bug [archive] was reported in version 7.0.2 that allowed systems with GVfs/GIO support to bypass Firefox proxy settings using a specially crafted URL, leading to an IP address leak.  Since Whonix-Gateway ™ (
sys-whonix) forces all traffic through Tor, and information leaks are blocked, Whonix ™ users were not affected by this bug. 
- A defect [archive] was discovered which allowed an adversary to use targeted clock skew correlation to identify a user. Since Tor Browser transmits TLS "Hello Client"
gmt_unix_timethere are two scenarios in which these transmissions could be used to track users.
- In the first scenario an adversary either compromises NTP [archive] servers or uses a man-in-the-middle to intercept NTP server replies and introduces a unique clock skew. Since "Hello Client" transmissions are visible to ISPs that host Tor Exit Relays as well as destination servers, an adversary could use clock skew correlation to track users' movements.
- In the second scenario, a user visits a clearnet website under adversary control without Tor Browser and the unique clock skew of the TLS "Hello Client"
gmt_unix_timeis recorded. Afterwards, the user visits the same or a different adversary-controlled website using Tor Browser. If both clock skews match, this could indicate the two visitors were the same person. At the very least this would significantly degrade anonymity. Since Whonix ™ uses Boot Clock Randomization and sdwdate and not NTP to keep time, these instances of targeted clock skew correlation and many like it are defeated.
- The majority (68%) related to memory corruption bugs.
- https://www.whonix.org/wiki/Comparison_with_Others#Flash_.2F_Browser_Plugin_Security [archive]
- http://linux.debian.bugs.dist.narkive.com/Z4frRjjC/bug-860268-desktop-files-can-hide-malware-in-nautilus [archive]
- https://micahflee.com/2017/04/breaking-the-security-model-of-subgraph-os/ [archive]
- The Subgraph OS sandbox framework is known as Oz, which is unique to the platform. It is designed to isolate applications from each other and the rest of the system.
- To be fair, when this bug was reported Subgraph OS was still in Alpha status.
- All data inside Whonix-Workstation ™ (
anon-whonix) would be available to the attacker and aid deanonymization.
- https://twitter.com/subgraph/status/852000407253594114 [archive]
- https://mailman.boum.org/pipermail/tails-dev/2012-September/001704.html [archive]
- https://github.com/Whonix/sdwdate [archive]
- To be fair, when this attack was first described Whonix ™ did not exist.
- https://mailman.boum.org/pipermail/tails-dev/2012-September/001704.html [archive]
- https://trac.torproject.org/projects/tor/ticket/5741 [archive]
- https://blog.torproject.org/tor-security-advisory-old-tor-browser-bundles-vulnerable [archive]
- Since Whonix-Workstation ™ (
anon-whonix) is unaware of the MAC address.
- https://www.wearesegment.com/research/tormoil-torbrowser-unspecified-critical-security-vulnerability/ [archive]
Quote The Tor Project [archive]:
Tails and Whonix users, and users of our sandboxed Tor Browser are unaffected, though.