Whonix Virtual Box Leaks Host OS : CafeDread | Torhoo darknet markets
Crosspost from Opsec since they limit who can post on their sub.
Hi,
I recently started to use Whonix over TailsOS, as the passing everything through a TOR gateway seems like a better practice in limiting the possibility of leaks by user or attacker.
The downside is that you have to run Whonix in a VM since it requires two separate iso's to run simultaneously the "gateway" and the Whonix OS.
I always like to run my setup through a few different tools to verify what information is leaked and available to websites and alphabets agencies, and in my testing of browser fingerprinting, I seen that the websites fingerprint analysis revealed my main host OS.
Test Case 1:
Installed Virtualbox on Windows Host, started Whonix gateway and then Whonix OS in VMware, verified TOR connection and then tested browser fingerprinting it hows my browser shows Windows 10/Server but using Linux.
Test Case 2
Installed Virtualbox on Ubuntu Host, fingerprint test shows using Linux Server but using Linux.
How the fuck is my main host leaking through a VM and TOR on Whonix, whats interesting in TailsOS I never seemed to have such an issue?
Also if I shut the Whonix gateway down, I am still able to use TOR, shouldnt the connection fail since the Whonix gateway is my TOR source?
That's nonsense. Try again.