Hacker News new | past | comments | ask | show | jobs | submit login
Everything About Tor [pdf] (ritter.vg)
96 points by QuinnWilton on July 24, 2015 | hide | past | favorite | 4 comments



There's no mention of Whonix.[0] Typically, it's a pair of VirtualBox VMs. The host machine can be running Windows, OSX or Linux. I prefer Linux, for perhaps obvious reasons. For stronger isolation between networking and workspace, Whonix can be installed as VMs in Qubes[3] or on hardware.[4]

> Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network[1], Debian GNU/Linux[2] and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP.

> Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call Whonix-Gateway. The other, which we call Whonix-Workstation, is on a completely isolated network. Only connections through Tor are possible.

[0] https://www.whonix.org/

[1] https://www.torproject.org/about/overview.html.en

[2] https://en.wikipedia.org/wiki/Debian

[3] https://www.whonix.org/wiki/Qubes

[4] https://www.whonix.org/wiki/Dev/Build_Documentation/Physical...


I spent a couple of hours studying an earlier version of these slides on two successive Fridays with some coworkers. Now we know a lot more about Tor than we ever have before.

If I had a choice about how to expand these slides to go into even more detail, I would like to see a little more coverage of attacks, including their feasibility and effectiveness.


Any chance there's a recorded talk of this? It'd be awesome to have some of the detail filled in


Nice, detailed summary of Tor. Maybe the next step would be a hyperlinked one where the points lead to specific detail on them that two other commenters were interested in.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: