Bitcoin Forum
May 01, 2024, 02:16:53 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1] 2 »  All
  Print  
Author Topic: Whonix vs. Tails vs. Linux  (Read 6727 times)
iluvbitcoins (OP)
Legendary
*
Offline Offline

Activity: 2198
Merit: 1150


Freedom&Honor


View Profile
May 10, 2015, 01:09:17 PM
 #1

Hey guys, I just bought a new laptop and I'm thinking of making it completely anonymous

Like 100%, encrypting it with a 30 char password so no mofo can break into it Cheesy

And using an OS + VPN so my info can't be revealed anywhere on the internet

I'm wondering which OS would be the best?

I'v heard good things about Whonix and Tails, but I'm wondering can I install usual files on it?

I need to be able to use bluestacks on the OS, skype probably and that's mostly it

I'd also like to be able to run a VPN, since I heard that TOR IP can be broken trough?

I'm not really too much savy about this things, that's why I'm asking about it

If you have any tips on anonymity I'll welcome your advice Smiley

Looking for a signature campaign.
1714573013
Hero Member
*
Offline Offline

Posts: 1714573013

View Profile Personal Message (Offline)

Ignore
1714573013
Reply with quote  #2

1714573013
Report to moderator
1714573013
Hero Member
*
Offline Offline

Posts: 1714573013

View Profile Personal Message (Offline)

Ignore
1714573013
Reply with quote  #2

1714573013
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
No Checks, Czechs Welcome
Newbie
*
Offline Offline

Activity: 20
Merit: 0


View Profile
May 10, 2015, 01:11:13 PM
 #2

Tails is just another Linux distribution right?



Anyway the best operating system doesn't exist. It's a matter of preference. Unless it's bloody windows that shit is shit. Although I do use it for posting when gaming  Cheesy
Nikinger
Full Member
***
Offline Offline

Activity: 141
Merit: 100



View Profile
May 10, 2015, 02:05:49 PM
 #3

Some applications are internally very complex, like browsers, and thus complex applications are notorious prone to serious security bugs, if exploited, the malware could simply turn off the anonymization. This is why I think that's a very bad idea to run the application which is subject to be anonymized on the same machine which is responsible for maintaining the anonymity.

I suggest you to use virtual machines at least, use physical machines if you fear facing an exploit which is capable to break out of the virtual machine.
Box #1 is responsible for the routing&anonymity only.
Box #2 is for non-anonymous stuff only (online banking, pizza service).
Box #3 is for anonymous stuff only.

1EwKrY5Bn3T47r4tYqSv6mMQkUyu7hZckV
Wonka
Member
**
Offline Offline

Activity: 64
Merit: 10


View Profile
May 10, 2015, 02:10:59 PM
 #4

Hey guys, I just bought a new laptop and I'm thinking of making it completely anonymous

Like 100%, encrypting it with a 30 char password so no mofo can break into it Cheesy

How are you going to remember a 30-character password? I think there's a good chance you would forget that then you'd be screwed.
Welsh
Staff
Legendary
*
Offline Offline

Activity: 3262
Merit: 4110


View Profile
May 10, 2015, 03:11:58 PM
 #5

How are you going to remember a 30-character password? I think there's a good chance you would forget that then you'd be screwed.

There's certainly techniques available for the inital remembering stage. I've remembered long passphrases and private keys over the years. Although, the private keys are not redudant has I've moved onto new addresses.

If he wants to make his life easier though, he could just use a password manager like keepass.
iluvbitcoins (OP)
Legendary
*
Offline Offline

Activity: 2198
Merit: 1150


Freedom&Honor


View Profile
May 10, 2015, 03:20:10 PM
 #6

Hey guys, I just bought a new laptop and I'm thinking of making it completely anonymous

Like 100%, encrypting it with a 30 char password so no mofo can break into it Cheesy

How are you going to remember a 30-character password? I think there's a good chance you would forget that then you'd be screwed.

I already have it memorized
It actually has over 30 charachters but I won't say how much exactly

Some applications are internally very complex, like browsers, and thus complex applications are notorious prone to serious security bugs, if exploited, the malware could simply turn off the anonymization. This is why I think that's a very bad idea to run the application which is subject to be anonymized on the same machine which is responsible for maintaining the anonymity.

I suggest you to use virtual machines at least, use physical machines if you fear facing an exploit which is capable to break out of the virtual machine.
Box #1 is responsible for the routing&anonymity only.
Box #2 is for non-anonymous stuff only (online banking, pizza service).
Box #3 is for anonymous stuff only.


doesn't their OS have an integrated browser?

Looking for a signature campaign.
Nikinger
Full Member
***
Offline Offline

Activity: 141
Merit: 100



View Profile
May 10, 2015, 04:28:27 PM
 #7

doesn't their OS have an integrated browser?
If you like to, of course because Linux is flexible but this isn't the point. It's more about separation by relocating a critical component (which is reponsible for the anonymization) away from your potentially vulnerable working environment where your browser runs.
If any application (which includes your browser) inside your anonymized working environment misbehaves or breaks, you will stay safe and anonymous if you delegate the task of anonymization to another machine. Without separation, a broken application could also break the anonymization.

1EwKrY5Bn3T47r4tYqSv6mMQkUyu7hZckV
iluvbitcoins (OP)
Legendary
*
Offline Offline

Activity: 2198
Merit: 1150


Freedom&Honor


View Profile
May 10, 2015, 04:43:18 PM
 #8

And how exactly do I do this?

Looking for a signature campaign.
Nikinger
Full Member
***
Offline Offline

Activity: 141
Merit: 100



View Profile
May 10, 2015, 06:30:48 PM
 #9

And how exactly do I do this?
I think the best and easiest for you is to start with is Virtual Box and Whonix for use in virtual machines (Gateway and Workstation). You can use VPN on the host computer and NAT your virtualized Whonix gateway over VPN. I haven't tested it but it's a good start and should work (I can't get too deep in detail because I use another customized solution).

After you got a bit familiar, don't stop being curious how this whole thing works. Read on: iptables, compiling sources, handling packages, configuring routes and network interfaces, proper up and down script handling, configuring and running VPN and Tor clients. The more you understand the more you control the tech.

Keep in mind, anonymity is more than just a piece of software, anonymity is a concept where you have to think about it. As an example, as soon as you log in to an account which is linked to your full name, using Tor can do harmful things.

Some thumb of rules and hints:
  • You shouldn't use anonymization when using online banking or doing things which are linked with your full name (e.g. pizza services) because your identity is known anyways.
  • Don't use the same (virtual) system for anonymous and non-anonymous activities because of potential finger printing techniques.
  • When using nick handles in the internet: you can't anonymize a nick handle, you only can deanonymize a nick handle. If you think your anonymous nick handle is accidentally compromised and linked with your full name in any way, abandon it which includes abandoning all email addresses and messenger accounts you used with the handle.

1EwKrY5Bn3T47r4tYqSv6mMQkUyu7hZckV
Buffer Overflow
Legendary
*
Offline Offline

Activity: 1652
Merit: 1015



View Profile
May 11, 2015, 06:49:31 AM
 #10

If you use a VPN you have to trust them, because they know which sites you will be visiting.

Guarantee there's a few NSA VPN honeypots around.

iluvbitcoins (OP)
Legendary
*
Offline Offline

Activity: 2198
Merit: 1150


Freedom&Honor


View Profile
May 11, 2015, 07:09:29 AM
 #11

If you use a VPN you have to trust them, because they know which sites you will be visiting.

Guarantee there's a few NSA VPN honeypots around.


I was thinking of using a VPN and Tor in the same time

How would that work? Cheesy

Looking for a signature campaign.
Buffer Overflow
Legendary
*
Offline Offline

Activity: 1652
Merit: 1015



View Profile
May 11, 2015, 07:18:48 AM
 #12

If you use a VPN you have to trust them, because they know which sites you will be visiting.

Guarantee there's a few NSA VPN honeypots around.


I was thinking of using a VPN and Tor in the same time

How would that work? Cheesy

Slow.

iluvbitcoins (OP)
Legendary
*
Offline Offline

Activity: 2198
Merit: 1150


Freedom&Honor


View Profile
May 11, 2015, 10:48:32 AM
 #13

Hahah

Yeah Cheesy

But it WOULD work, right? Cheesy

And my VPN provider wouldn't be aware of the websites I visit?

Looking for a signature campaign.
Buffer Overflow
Legendary
*
Offline Offline

Activity: 1652
Merit: 1015



View Profile
May 11, 2015, 11:16:55 AM
 #14

Hahah

Yeah Cheesy

But it WOULD work, right? Cheesy

And my VPN provider wouldn't be aware of the websites I visit?

I guess it would work. But there so many ways to can inadvertently leak your IP. You need to disable Flash, JavaScript and browser plugins for a start.
Torrent downloading will also announce your IP into the swarm, so also avoid those.

Best to just use TailsOS where everything is already setup for you.

iluvbitcoins (OP)
Legendary
*
Offline Offline

Activity: 2198
Merit: 1150


Freedom&Honor


View Profile
May 11, 2015, 01:24:17 PM
 #15

So using bluestacks and skype is impossible if I want a 100% anonymous environment?

Yes, I was thinking of just booting tails for it..
But I need bluestacks Cheesy

Looking for a signature campaign.
newflesh
Hero Member
*****
Offline Offline

Activity: 630
Merit: 500



View Profile
May 11, 2015, 01:38:37 PM
 #16

So using bluestacks and skype is impossible if I want a 100% anonymous environment?

Yes, I was thinking of just booting tails for it..
But I need bluestacks Cheesy

I'd avoid Skype completely, Tails has Pidgin if you want to send instant messages or you could install something like jitsi (https://jitsi.org/) but you would have to keep reinstalling it unless it's in stored in the persistent volume.
iluvbitcoins (OP)
Legendary
*
Offline Offline

Activity: 2198
Merit: 1150


Freedom&Honor


View Profile
May 11, 2015, 02:34:06 PM
 #17

Skype is a necessity, is their any way to just minimize its downsides?
Reinstalling every time won't be an issue

Does it matter that I have a dynamic IP instead of a static one?

Looking for a signature campaign.
Lauda
Legendary
*
Offline Offline

Activity: 2674
Merit: 2965


Terminated.


View Profile WWW
May 11, 2015, 02:44:11 PM
 #18

Skype is a necessity, is their any way to just minimize its downsides?
Reinstalling every time won't be an issue

Does it matter that I have a dynamic IP instead of a static one?
Do not install Skype. All that effort that you would go through would be in vain.
I'm not saying that you're going to do something illegal, but if you do you could get caught just because of Skype. Skype could have all sorts of backdoors built into it.

"The Times 03/Jan/2009 Chancellor on brink of second bailout for banks"
😼 Bitcoin Core (onion)
iluvbitcoins (OP)
Legendary
*
Offline Offline

Activity: 2198
Merit: 1150


Freedom&Honor


View Profile
May 11, 2015, 02:53:51 PM
 #19

I'm not doing anything illegal, I'm just exploring anonymity and ecryption Cheesy
What about bluestacks?
So jitsi is cool to use?

Looking for a signature campaign.
Mehek
Full Member
***
Offline Offline

Activity: 154
Merit: 100



View Profile
May 12, 2015, 03:12:18 PM
 #20

linux
Pages: [1] 2 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!