Advanced Security Guide Introduction
Whonix comes with many security features . Whonix is Kicksecure™ hardened by default and also provides extensive Documentation including a System Hardening Checklist. The more you know, the safer you can be.
This page is targeted at advanced users who wish to improve the security of their systems to become even more secure.
Essentials[edit]
Before reading or applying instructions in the Advanced Security Guide, first review the information found in the Computer Security Education and Basic Security Guide sections.
Important References[edit]
It is recommended to learn more about the following topics:
- Anonymizing MAC Addresses: Readers interested in this topic can also read the development discussion and draw their own conclusions.
- Connections between Whonix-Gateway™ and Whonix-Workstation™
- Entropy
- Restrict TransPort: This is explained under Whonix-Workstation is firewalled
- Stream Isolation
- Time Attacks
- Whonix Design: Technically-minded readers can review the recommendations on how less-than-ideal specifications could be improved.
- Whonix Documentation: Some application-specific documentation will have no relevance, but a thorough study of various entries will increase overall awareness and gradually improve anonymity and security practices.
Useful External Links[edit]
- Debian Security Information
- Debian / Ubuntu Linux Install Advanced Intrusion Detection Environment (AIDE) Software [1]
- Linux Administrator's Security Guide
- Linux Server and Network Security
- Securing Debian Manual
- What steps do you take to secure a Debian server?
- Ubuntu documentation - Antivirus
- Ubuntu wiki - Basic Security [2]
- Ubuntu wiki - Did I Just Get Owned?
Footnotes[edit]
- ↑ See also: AIDE Debian package and the AIDE homepage.
- ↑ Since Ubuntu is based on Debian.
We believe security software like Whonix needs to remain open source and independent. Would you help sustain and grow the project? Learn more about our 12 year success story and maybe DONATE!