Whonix Research
Researchers working with us:
keystroke obfuscation[edit]
Vinnie Monaco, the author of the paper Obfuscating Keystroke Time Intervals to Avoid Identification and Impersonation has written kloak - Obfuscate keystroke timings to help protect privacy due to Whonix request. It is now pre-installed by default in Whonix.
TCP ISN CPU Information Leak Protection tirdad[edit]
- https://bitguard.wordpress.com/2019/09/03/an-analysis-of-tcp-secure-sn-generation-in-linux-and-its-privacy-issues/
- https://github.com/Kicksecure/tirdad
- https://github.com/0xsirus/tirdad
TCP ISNs and Temperature induced clock skews[edit]
Ethan White, the author Practical deanonymization using CPU load covert channels helping us with CPU-induced latency Covert Channel Countermeasures.
TODO: https://phabricator.whonix.org/T530#10274
single-gw multiple-ws vs multiple-gw multiple-ws mapped 1:1[edit]
Tor Project research wanted blog post on single-gw multiple-ws vs multiple-gw multiple-ws mapped 1:1
in progress
- https://phabricator.whonix.org/T567#11239
- https://lists.torproject.org/pipermail/tor-dev/2016-December/011720.html
- Dev/Multiple Workstations
See Also[edit]
If you found that interesting, you might also like the following pages.
- Advanced Deanonymization Attacks
- Dev/Advanced Deanonymization Attacks
- What we do, Things the Whonix project is working on; Innovate; Cooperate; Mentor; Educate; Maintenance
We believe security software like Whonix needs to remain open source and independent. Would you help sustain and grow the project? Learn more about our 12 year success story and maybe DONATE!