Whonix Research

From Whonix
< Dev
Jump to navigation Jump to search

Researchers working with us:

keystroke obfuscation[edit]

Vinnie Monaco, the author of the paper Obfuscating Keystroke Time Intervals to Avoid Identification and Impersonationarchive.org iconarchive.today icon has written kloak - Obfuscate keystroke timings to help protect privacyarchive.org iconarchive.today icon due to Whonix requestarchive.org iconarchive.today icon. It is now pre-installed by default in Whonix.

TCP ISN CPU Information Leak Protection tirdad[edit]


TCP ISNs and Temperature induced clock skews[edit]

Ethan White, the author Practical deanonymization using CPU load covert channelsarchive.org iconarchive.today icon helping us with CPU-induced latency Covert Channel Countermeasures.

TODO: https://phabricator.whonix.org/T530#10274archive.org iconarchive.today icon

single-gw multiple-ws vs multiple-gw multiple-ws mapped 1:1[edit]

Tor Project research wanted blog post on single-gw multiple-ws vs multiple-gw multiple-ws mapped 1:1 in progress

See Also[edit]

If you found that interesting, you might also like the following pages.

We believe security software like Whonix needs to remain open source and independent. Would you help sustain and grow the project? Learn more about our 13 year success story and maybe DONATE!