There are a lot of questions on this topic, so I apologize. I just had a really specific question. For my particular situation, I do all of my work on my local CPU. Since all of my work will be done on my personal CPU, I don't think it's necessary, but I was just wondering. You are commenting using your WordPress. You are commenting using your Google account.
You are commenting using your Twitter account. You are commenting using your Facebook account. Notify me of new comments via email. Notify me of new posts via email. Create a website or blog at WordPress.
Whonix vs Tails, which one is better?
Tails, Whonix, and Qubes question There are a lot of questions on this topic, so I apologize. Share this: Twitter Facebook. Like this: Like Loading Leave a Reply Cancel reply Enter your comment here Fill in your details below or click an icon to log in:. Email required Address never made public. Name required. Create your website at WordPress. By continuing to use this website, you agree to their use.
Live CDs do not install anything on the host system and it leaves no documents or other traces behind when it is shut down. This ensures that there is no way for any malware or tracking software to survive multiple sessions. Qubes OS creates a series of increasingly trusted virtual machines so that activities taking place in an untrusted virtual machine cannot affect applications in others.
Whonix has a two-part system whereby you perform all your work in a virtual machine workstation. It routes all of your network traffic through the other virtual machine gateway which connects to the Tor network. Qubes OS is best described as a Xen distribution running virtual Linux domains. Xen is a very stable and mature bare-metal type 1 hypervisor. This type of virtualization is analogous to what you may be picturing when using a product like VirtualBox with one important difference.
A type 1 hypervisor has has no operating system running below it which can be compromised. Xen is installed on the bare metal and can then create and manage virtual machines. This architecture allows Qubes to create separate virtual machines domainsin Xen parlance in which to run applications.
If you end up being infected with malware from a bad website, or by falling prey to an email phishing scam, it would be hard for that malware to spread outside of the domain it is in. Qubes calls these Xen domains qubes. It creates a number of qubes in which to assign application instances. For example, surfing miscellaneous websites that you have no reason to trust is probably best done in the untrusted qube.
Work related activities on trusted websites and applications may be done in the trusted zone. The point being that each qube only has the potential to affect applications in the same qube.
The Qubes team indicates that the window borders are unforgeable because they are constructed at the Xen domain zero dom0 level, which is the privileged domain Xen starts at boot time, and it manages all the other domains, or qubes in this case.
The qubes are unable to interact with dom0 and qubes are unprivileged meaning they cannot access low level system functions themselves. The window border coloring provides a fairly instant way to see the trust level of each window. In this screenshot we can see red untrustedgreen trusted and yellow somewhere in the middle window borders. A very common phishing technique is to use a website to create a very realistic login box for some service and attempt to get people to enter their credentials.
If that were the case here, the password box would have a red border which would be your signal that something risky may be happening. An excellent way to tack a good anonymity layer onto the already robust security model is to use Whonix, discussed later, with Qubes. Because Qubes OS runs each application in a separate qube, the Whonix gateway and workstation will run in separate qubes.
This further abstracts them from each other. If the Whonix gateway or workstation are run in their own qube and are somehow compromised, they would be unable to access any other application on the computer. There are instructions here on how to create the necessary Qubes OS templates for Whonix. Whonix is designed specifically to provide anonymity while using the internet. It consists of two virtual machines, the gateway and the workstation. The workstation can only talk to the gateway and the gateway connects to the internet via Tor.
Both are VirtualBox virtual machine appliances, so you can run it on any operating system that runs VirtualBox. The Whonix workstation and gateway are configured to use a private network on your host computer.If you're interested in security, you've probably already heard of security-focused Linux distros like Tails, Kali, and Qubes. They're really useful for browsing anonymously, penetration testing, and tightening down your system so it's secure from would-be hackers.
Here are the strengths and weaknesses of all three.
Subscribe to RSS
It seems like every other day we hear about another hack, browser exploit, or nasty bit of malware. If you do a lot of your browsing on public Wi-Fi networks, you're a lot more susceptible to these types of hacks. A security-focused distribution of Linux can help. For most of us, the use cases here are pretty simple. If you need to use a public Wi-Fi network at a coffee shop or the library, then one of these distributions can hide your traffic from someone trying to peek in.
Likewise, if you're worried about someone tracking down your location—whether it's a creepy stalker or something even worse—randomizing and anonyming your traffic keeps you safe. Obviously you don't need this all the time, but if you're checking bank statements, uploading documents onto a work server, or even just doing some shopping, it's better to be safe than sorry.
That means you can carry them around in your pocket and boot into them when you need to without causing yourself too much trouble. Tails is a live operating system built on Debian that uses Tor for all its internet traffic. Its main goal is to give you security through anonymity.
With it, you can browse the web anonymously through encrypted connections. Tails protects you in a number of ways. First, since all your traffic is routed through Tor, it's incredibly difficult to track your physical location or see which sites you visit.
Tails doesn't use a computer's hard disk, so nothing you do is saved to the computer you're running it on. Instead, everything you're working on is stored in RAM and erased when you shut down.
This means any sensitive documents you're working on are never stored permanently. Because of that, Tails is a really good operating system to use when you're on a public computer or network. Tails is also packed with a bunch of basic cryptographic tools. The crux of Tails is anonymity. While it has cryptographic tools in place, its main purpose is to anonymize everything you're during online. This is great for most people, but it doesn't give you the freedom to do stupid things.
If you log into your Facebook account under your real nameit's still going to be obvious who you are and remaining anonymous on an online community is a lot harder than it seems.
Pros: Routes all your traffic through Tor, comes with a ton of open-source software, has a "Windows Camouflage" mode to make it look more like Windows 8. Cons: Can't save files locally, slow, loading web sites through Tor takes forever. Who It's Best For: Tails is best suited for on-the-go security. If you find yourself at coffee shops or public libraries using the internet a lot, then Tails is perfect for you. Anonymity is the game, so if you're sick of everyone tracking what you're doing, Tails is great, but keep in mind that it's also pretty useless unless you use pseudonyms everywhere online.
Where Tails is about anonymity, Kali is mostly geared toward security testing.
Kali is built on Debian and maintained by Offensive Security Ltd. Kali's main focus is on pen testing, which means it's great for poking around for security holds in your own network, but isn't built for general use. That said, it does have a few basic packages, including Iceweasel for browsing the web and everything you need to run a secure server with SSH, FTP, and more.How Do I Tails?: A Beginner's Guide to Anonymous Computing
Likewise, Kali is packed with tools to hide your location and set up VPNsso it's perfectly capable of keeping you anonymous.
Kali has around tools for testing the security of a network, so it's hard to really keep track of what's included, but the most popular thing to do with Kali is crack a Wi-Fi password. Kali's motto adheres to "a best defense is a good offense" so it's meant to help you test the security of your network as a whole, rather than just making you secure on one machine.
Still, if you use Kali Linux, it won't leave anything behind on the system you're running it on, so it's pretty secure itself. Pros: Everything you need to test a network is included in the distribution, it's relatively easy to use, and can be run on both a Live CD and in a virtual machine.Discussion in ' privacy technology ' started by DesuMaidenJan 9, Log in or Sign up. Wilders Security Forums. Whonix vs Tor Browser Bundle vs Tails Joined: Jan 25, Posts: I was just wondering.
Some people say Whonix isn't as scare as most people think. According to ip-check. So what do you guys say? Or am I incorrect? DesuMaidenJan 9, Joined: Oct 1, Posts: 9, TBB, Tails and Whonix have different goals, and different target audiences.
TBB is targeted at casual users, and anonymity all users looking alike, and preventing tracking is its main goal. Tails and Whonix are both targeted at sophisticated users, but their goals are different. While both strive for anonymity, Tails focuses on amnesia, although there is an option for saving stuff when run from a USB flash drive.
Although opening the TBB in Sanboxie is evidently pretty darn good. I am not too interested in Tails since you cannot start a VPN on your computer first. Which hasn't been often. But I am thinking about using it more often. I just have to get use to using a virtual machine.
Joined: Dec 15, Posts: Location: io. I enjoy whonix but find it can be a bit of a headache to get it started more so if one is restarting and switching the pc on and off regularly. Felt more lazy friendly. Paranoid EyeJan 13, Joined: Apr 22, Posts: Is there anywhere you can download all of the older versions of TBB? Paranoid EyeJan 14, Show Ignored Content.GitHub is home to over 40 million developers working together to host and review code, manage projects, and build software together.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community. Already on GitHub? Sign in to your account. Related: CC: adrelanosbnvkmfc. They could help by releasing a new version or by providing instructions how to create a Qubes live cd. Can you explain why? I'm not denying that it's a duplicate, but it's not immediately obvious to me that it is.
I'm amazed is still open: it was only ever a display problem, for which I gave solution. It's not an issue now. Running tails in qubes is straightforward whether in Live or installed: all the folk here are doing is documenting precise steps.
I can also confirm that this is working since the tails jessie release 2. However, I don't know if I'm the only one experiencing this and if this is a qubes or tails issue. I guess it is the missing gui agent in tails or in debian in general.
So I recommend closing this ticket and moving conversation towards re: Tails-like functionality in Qubes. Skip to content. Dismiss Join GitHub today GitHub is home to over 40 million developers working together to host and review code, manage projects, and build software together.
Sign up. New issue.Privacy and security have become increasing concerns for internet users, not least with increased government monitoring and corporate collection of user data, and a long string of well-publicized hack attacked in which this user data has been stolen and mis-used. While Windows and macOS machines have some protections in place, and there are additional options such as using a VPN or Tor browser, a number of Linux distros are now available that put privacy and security at their core.
Save even more with the exclusive code "TechRadar20", valid till April 10th. View Deal. The course is presented by Jason Cannon, the author of Linux for beginnersand includes around minutes of in-demand video and four downloadable resources. For some of these Linux distros it's a case of building in privacy protection by default using a variety of tools. For others, it's a matter of including security software as standard for those who need to do penetration testing.
Here we'll list the best 10 for you to consider. While definitely not for novice users, Qubes is one of the top privacy-conscious distros. The graphical installer must be used to install the OS to your hard drive, which will be encrypted.
Qubes, Whonix, or Tails: which Linux distro should you use to stay anonymous?
The main desktop uses colour-coded windows to show different virtual machines, making it easy for you to tell them apart. All connections are routed through the anonymity network Tor, which conceals your location.
There are also a small number of productivity apps such as Mozilla Thunderbird and the powerful LibreOffice suite. You can install more applications from Debian repositories via the command line, but they will take some time to download as they pass through the Tor network. Do note that vulnerabilities are constantly discovered with Tails so be sure to check for updates as you should do with any OS, of course. This pen-testing distro is based on Arch Linux, which may be good or bad news depending on how familiar you are with its parent operating system.
While relatively new, this OS contains over 2, different hacking tools, saving you the trouble of having to download what you need each time. These are very large in size currently 14 GB due to the amount of pre-installed programs, but note that there's also a much smaller Netinstall version which is only around MB. It can even be installed onto a Raspberry Pi to give you a portable pen-testing computer that you can carry anywhere. Named after the Hindu goddess, Kali is one of the oldest and most well-known pen-testing Linux distros.
The Kali download page offers ISOs that are updated weekly, which can be run in live mode or installed to a drive.It is a live operating system that aims to preserve your privacy and anonymity.
Tails is intended to be booted off of a live CD and leave no trace on the computer it is run on, but using Tails this way requires the user to restart their computer every time they want to switch from their installed OS to Tails.
Despite this, in case that method becomes cumbersome, Tails can be used inside virtualization software and Qubes. This was reported with earlier versions of Tails: The problem should now be fixed. If you do encounter this problem, you can try to constrain display settings by appending vga codes to the Tails boot parameters.
This seems to arise because Tails sizes to the height of the screen, but there is a title bar at the top of the window.
The persistence tools will not work because Tails has not been launched from USB. The HVM disk s can be configured and mounted from within Tails to provide persistent storage. If you want to use an existing USB persistent volume:. The Tails qube will not shut down cleanly. You will probably want to implement MAC spoofing. There are added security concerns for Tails users when running it in a virtual machine.
If you intend to do this, you should read the warnings from the Tails team about it. While the Qubes security model mitigates most of the risks identified, traces of the Tails session may remain on the disk.
Depending on your threat model, this might induce too much risk. Toggle navigation Qubes OS. External Documentation This is unofficial, third-party documentation. The Qubes OS Project cannot guarantee the accuracy of this page. Please exercise caution.