Actions

Whonix-Workstation Security Hardening

Introduction[edit]

Whonix is by no means a perfectly hardened system. Additional hardening measures are most welcome, but at the same time, hardening by default is very difficult. Until the Whonix Anonymous Operating System project realizes a significant increase in resources or community assistance, such measures will remain out of scope and hardening will be left to the upstream operating system. See Virtualization Platform for further details.

AppArmor[edit]

Learn more about AppArmor, which helps to protect against vulnerabilities by confining a program's file access based upon strict rule-sets. It is recommended to apply the available Whonix AppArmor profiles to contain various applications which are run in Whonix-Gateway (sys-whonix) and/or Whonix-Workstation (anon-whonix), like Tor, Tor Browser, Thunderbird and others.

Multiple Tor Browser Instances and Workstations[edit]


Appropriate compartmentalization of user activities is important when different identities and/or additional software are in use. Multiple Tor Browser instances provide some separation of distinct identities, however this issue has not yet been fully solved by Tor Browser or Torbutton. A more secure method of compartmentalization is using Multiple Whonix-Workstations, which are easily created.

Multiple Tor Browser Instances[edit]

To better separate different contextual identities, users should consider starting multiple Tor Browser instances. Follow the steps in the Manually Downloading Tor Browser entry, except for minor changes that are necessary; for example Tor Browser must be extracted into a different folder.

This method is less secure than using multiple Whonix-Workstations, which is outlined below.

Multiple Whonix-Workstations[edit]

For tasks requiring different identities and/or additional software, users are recommended to utilize two or more Whonix-Workstation VMs since different torified clients are isolated from each other. In this way, an exploit in Tor Browser in one Whonix-Workstation cannot simultaneously read the user's identity in another VM (for example, an IRC account). [1] Note that this method is less secure than using a Whonix-Workstation DisposableVM with Tor Browser in Qubes-Whonix.

Footnotes[edit]

  1. This does not protect against the sudden loss of networking, which could reveal to the attacker that two activities / accounts suddenly going off-line are probably related.

License[edit]

Whonix Whonix-Workstation Security Hardening wiki page Copyright (C) Amnesia <amnesia at boum dot org>
Whonix Whonix-Workstation Security Hardening wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP <adrelanos@riseup.net>

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it under certain conditions; see the wiki source code for details.


Random News:

Want to make Whonix safer and more usable? We're looking for helping hands. Check out the Open Issues and development forum.


https | (forcing) onion

Share: Twitter | Facebook

This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! See Conditions for Contributions to Whonix, then Edit! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix is a licensee of the Open Invention Network. Unless otherwise noted, the content of this page is copyrighted and licensed under the same Libre Software license as Whonix itself. (Why?)