News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Whonix Virtual Box Leaks Host OS : CafeDread | Torhoo darknet markets

Crosspost from Opsec since they limit who can post on their sub.
Hi,

I recently started to use Whonix over TailsOS, as the passing everything through a TOR gateway seems like a better practice in limiting the possibility of leaks by user or attacker.

The downside is that you have to run Whonix in a VM since it requires two separate iso's to run simultaneously the "gateway" and the Whonix OS.

I always like to run my setup through a few different tools to verify what information is leaked and available to websites and alphabets agencies, and in my testing of browser fingerprinting, I seen that the websites fingerprint analysis revealed my main host OS.

Test Case 1:
Installed Virtualbox on Windows Host, started Whonix gateway and then Whonix OS in VMware, verified TOR connection and then tested browser fingerprinting it hows my browser shows Windows 10/Server but using Linux.

Test Case 2
Installed Virtualbox on Ubuntu Host, fingerprint test shows using Linux Server but using Linux.

How the fuck is my main host leaking through a VM and TOR on Whonix, whats interesting in TailsOS I never seemed to have such an issue?
Also if I shut the Whonix gateway down, I am still able to use TOR, shouldnt the connection fail since the Whonix gateway is my TOR source?
"Whonix over TailsOS"

That's nonsense. Try again.
/u/eyeballing1 📢
1 points
8 months ago
why? explain?
Work it out yourself. Or pay me $250 ph
/u/Doghouseowner
2 points
8 months ago
whonix over tails is retarded shit
/u/abracabra
1 points
8 months ago
I'm about to make a post about this.
/u/eyeballing1 📢
1 points
8 months ago
I will look forward to reading it
/u/[deleted]
1 points
8 months ago
if you are using tor browser shouldnt it always think ur on windows?
/u/mathbot
1 points
8 months ago
I thought about Whonix but it looked too complicated. I'd rather just install my own OS on a usb stick and encrypt everything, and then analyze the packets at my router with tcpdump / wireshark, and make sure everything going out goes through tor.

tails OS is simple. Not sure if I trust it though. (Linux always seems to have exploits.) The authorities caught an online blackmailer using a video player exploit in an older version of Tails OS.
/u/azrael13
1 points
8 months ago
Virtualbox suuuckks, look into KVM, its easier on linux and you can manage your VMs with virtmanager.
It has a better performance too
Yea I'm sure op will think that
qemu-system-x86_64 -enable-kvm -hda <yourimage>.qcow2 -boot d -cdrom /path/to/whonix.iso -smp <number of cores> -m <ram you intend to give the vm> 

is much easier than virtualbox. And the command might be missing some arguments, I wrote it from memory.
/u/BastardSon
1 points
8 months ago
I still don't remember it after 2 year of using it everyday lol
/u/azrael13
1 points
8 months ago
I know right thank god for bash history. but seriously go check out virt-manager it does all that automatically and has a nice gui
/u/MauriceMoss
1 points
8 months ago
IIRC, publicly available and up-to-date official whonix.iso does not exist currently.