Author

Topic: Whonix Anonymous Operating System, anything, any Bitcoin client/server over Tor (Read 6774 times)

newbie
Activity: 33
Merit: 0
electrum BTC wallet is installed by default nowadays.

Whonix VirtualBox 15.0.1.3.4 - Testers Wanted!

https://forums.whonix.org/t/whonix-virtualbox-15-0-1-3-4-testers-wanted/9496

...which comes with Monero GUI installed by default.
hero member
Activity: 1220
Merit: 612
OGRaccoon
Top project whonix comes with the cubes os which is very nice indeed.
I would recommend the use of Whonix in the cubes environment works very well.

Keep up the good work! 
legendary
Activity: 3920
Merit: 2349
Eadem mutata resurgo
newbie
Activity: 33
Merit: 0
Whonix for VirtualBox with CLI - Command Line Interface 14.0.0.9.4 - No graphical user interface. (No GUI) - Headless - Testers Wanted!

https://forums.whonix.org/t/whonix-for-virtualbox-with-cli-command-line-interface-14-0-0-9-4-no-graphical-user-interface-no-gui-headless-testers-wanted/6313
newbie
Activity: 33
Merit: 0
newbie
Activity: 33
Merit: 0
newbie
Activity: 33
Merit: 0
Any more thoughts on integrating Electrum as mentioned early in this thread?
That is a rather difficult ongoing development discussion, see:
https://phabricator.whonix.org/T215
hero member
Activity: 761
Merit: 606
I love this project idea.  I have run Whonix and find its pretty user friendly.  One note would be to consider over time:  many BTC users are buying hardware wallets and pairing them with a good software setup.  By preventing private keys from ever touching a computer it affords maximum protection.  Accommodating hardware wallets would encourage more participation.  Just pointing out the "end game".


Any more thoughts on integrating Electrum as mentioned early in this thread?
newbie
Activity: 33
Merit: 0
full member
Activity: 228
Merit: 100
CIYAM - UI/UX design
newbie
Activity: 33
Merit: 0
Can do it, why not. (Not a must, only if you like of course.)
full member
Activity: 228
Merit: 100
CIYAM - UI/UX design
hey adrelanos,

should i post the new logo here then too? Or do you want to do this?!
newbie
Activity: 33
Merit: 0
Yes, that needs update/rewrite.

Quote
Quote
There doesn't seem to be a modern MAC, instead there's systrace which has been criticized for having fundamental security problems (this may or may not have changed since then)

Why don't you take a FreeBSD? There is a complete modern MAC.

Does FreeBSD have a secure package manager?

Does it defend this (w)?

Does it cover the TUF threat model (w)?

Can every user download from an already existing '''signed''' repository or is it required to run an own repository?

Quote
Quote
OpenBSD's target audience aren't end users, that's why they don't care to provide signed updates for the masses, see How to check downloaded package on OpenBSD 5.1?.

OpenBSD produce OpenSSH, there is rsync gateway for download packages, also there is AFS(Andrew File System) with alot of mirrors of OpenBSD repositories.
Not sure how rsync helps? Its just a great tool to conveniently sync files, but doesn't help with verification, unless download over ssh.

AFS: Any link to information how to use it?

Who signs packages? Must mirrors be trusted or do signatures come from OpenBSD?

Quote
Quote
OpenBSD's website isn't reachable over SSL or as a Tor hidden service. How are users supposed to securely view the OpenBSD site and not learn things set up by a man-in-the-middle?

You develop over TOR, Do you know how it can help you browse OpenBSD's website? You still worry about the middle?

Yes.

user <-> user ISP <-> internet <-> OpenBSD ISP <-> OpenBSD server
       MITM less likely for this route |  no help for this route



legendary
Activity: 3920
Merit: 2349
Eadem mutata resurgo
http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data

Quote
the ability to search HTTP activity by keyword permits the analyst access to what the NSA calls "nearly everything a typical user does on the internet".

You might find some of the information above relevant ...
newbie
Activity: 10
Merit: 0
My 10cents for offtopic,

Read you FAQ

https://whonix.org/wiki/FAQ#Why_aren.27t_you_using_OpenBSD.2C_it.27s_the_most_secure_OS_ever.21.21.211.21

Quote
There doesn't seem to be a modern MAC, instead there's systrace which has been criticized for having fundamental security problems (this may or may not have changed since then)

Why don't you take a FreeBSD? There is a complete modern MAC.


Quote
OpenBSD is also a very small OS (small TCB),
It is not a Linux zoo, you right. It is secure focused OS.


Quote
OpenBSD's target audience aren't end users, that's why they don't care to provide signed updates for the masses, see How to check downloaded package on OpenBSD 5.1?.

OpenBSD produce OpenSSH, there is rsync gateway for download packages, also there is AFS(Andrew File System) with alot of mirrors of OpenBSD repositories.


Quote
OpenBSD's website isn't reachable over SSL or as a Tor hidden service. How are users supposed to securely view the OpenBSD site and not learn things set up by a man-in-the-middle?

You develop over TOR, Do you know how it can help you browse OpenBSD's website? You still worry about the middle?


Quote
"buy the CDs"

Let me tell you once again, look at AFS( Andrew File System ).

Anyway, Linux - is a great choose, too. Good luck you with your job!
newbie
Activity: 33
Merit: 0
What if you are not under active surveillance? I want to avoid passive data collection.

The second part of my answer was supposed to answer that.

Quote
For the other cases, that depends if Tor does protect from nsa. The answer to that is not really clear:
https://lists.torproject.org/pipermail/tor-talk/2013-July/029014.html

And even if Tor was a whole lot better, you can never prove a negative. So I am hesitate with any broad claims and would be skeptical if some other project claimed that.

Also Whonix does not make such broad claims. For an related statement about three letter agencies, also see:
https://whonix.org/wiki/Dev/Technical_Introduction#With_more_technical_terms
newbie
Activity: 16
Merit: 0
What if you are not under active surveillance? I want to avoid passive data collection.
newbie
Activity: 33
Merit: 0
What if you are not under active surveillance? I want to avoid passive data collection.

The second part of my answer was supposed to answer that.

Quote
For the other cases, that depends if Tor does protect from nsa. The answer to that is not really clear:
https://lists.torproject.org/pipermail/tor-talk/2013-July/029014.html

And even if Tor was a whole lot better, you can never prove a negative. So I am hesitate with any broad claims and would be skeptical if some other project claimed that.

Also Whonix does not make such broad claims. For an related statement about three letter agencies, also see:
https://whonix.org/wiki/Dev/Technical_Introduction#With_more_technical_terms
newbie
Activity: 16
Merit: 0
Does this protect you against the nsa
full member
Activity: 228
Merit: 100
CIYAM - UI/UX design
cool idea. will give it a try  +1

@adrelanos: you got PM



newbie
Activity: 33
Merit: 0
True. 01BTC10 said it already. This is only an issue in public networks, i.e. WiFi hotspots.
vip
Activity: 756
Merit: 503
I don't understand how the ISP could record your MAC address unless they have access to your router. MAC address is only needed on LAN and is not broadcast to the WAN.
legendary
Activity: 3920
Merit: 2349
Eadem mutata resurgo

Of the connecting device running WHONIX. It is a known vulnerability of Tor routing that many (all?) ISPs record MAC addresses. So that when you connect without WHONIX the MAC address will be the same as when connecting with WHONIX, unless it spoofs the MAC address on the network connection.

Quote
In home networks, there is no reason to change it, since its never send to the ISP.

In public networks it gets really difficult. Just using a random MAC address isn't sane. It depends on threat models, what is best.

There is a whole documentation chapter about that topic: See:
https://whonix.org/wiki/Pre_Install_Advice#MAC_Address

And to find out how difficult it was to solve the controversy of MAC addresses in public networks, see:
https://whonix.org/wiki/Dev/MAC

At the moment no one knows the answers, its only clear, that it's not as simple as "use a random MAC".

Yeah, I bet there is ... the ISPs are selling their customers out by not keeping private data private. These are not new problems.


full member
Activity: 154
Merit: 100
(is there a typo in the thread subject? makes me think of )
newbie
Activity: 33
Merit: 0
Does it spoof MAC address?

From whom?

Applications usually don't send the MAC address to anyone else and malicious applications inside a Whonix-Workstation VM could only send a virtual MAC address (which isn't your real one) to someone.

In home networks, there is no reason to change it, since its never send to the ISP.

In public networks it gets really difficult. Just using a random MAC address isn't sane. It depends on threat models, what is best.

There is a whole documentation chapter about that topic: See:
https://whonix.org/wiki/Pre_Install_Advice#MAC_Address

And to find out how difficult it was to solve the controversy of MAC addresses in public networks, see:
https://whonix.org/wiki/Dev/MAC

At the moment no one knows the answers, its only clear, that it's not as simple as "use a random MAC".
legendary
Activity: 3920
Merit: 2349
Eadem mutata resurgo
Does it spoof MAC address?
newbie
Activity: 33
Merit: 0
Our new website is online!
https://whonix.org

We are also looking for developers to make Whonix even better!
https://whonix.org/w/images/a/a3/Whonix-ad.png
newbie
Activity: 33
Merit: 0
Sorry to hijack,

I don't see it as hijacking.

but OpenBSD and FreeBSD developers disagree, they claim virtualbox or hypervisor is just bugs on top of an already buggy arch and the idea that they can't break out from their weak software isolation is ideology not computer science. Look up virtualization on both mailing lists for more info, esp Theo De Raadts comments:
By the way, there is a statement about OpenBSD:
https://whonix.org/wiki/FAQ#Why_aren.27t_you_using_OpenBSD.2C_it.27s_the_most_secure_OS_ever.21.21.211.21

Wouldn't it be better to run an actual firewall, and dmz with your tor server in it then proxy all your communications through it with pf rules? This can be accomplished with tiny boxes, old servers and even a couple of $200 laptops instead of virtualization.
Yes. You can do that with Whonix already. It is recommend on the Security page. Please see:
https://whonix.org/wiki/Physical_Isolation
newbie
Activity: 33
Merit: 0
Cool, I will give it a try. Do you know how it compare to TAILS ?
Yes, this has been extensively compared.

https://whonix.org/wiki/Comparison_with_Others

Feel free to ask if there are still questions open.
legendary
Activity: 1099
Merit: 1000
Cool, I will give it a try. Do you know how it compare to TAILS ?
newbie
Activity: 33
Merit: 0
Introduction:
Quote
Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP.

Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call Whonix-Gateway. The other, which we call Whonix-Workstation, is on a completely isolated network. Only connections through Tor are possible.

https://whonix.org/w/images/9/90/Whonix.jpg

The official Bitcoin-qt client works, thanks to the Transparent Proxy feature, very well in Whonix out of the box. Connections to normal and hidden servers work. Setting up a hidden Bitcoin server should also work, since Whonix supports everything Tor support and more, just with stronger guarantees of hiding IP/location. The usual IP/DNS leak issues vanish.

This topic is supposed to find and solve any Tor/anonymity related problems with respect to Bitcoin. I am also probing for general interest in this project.

The offical Bitcoin-qt client is unfortunately not yet included into Whonix by default, because Bitcoin-qt didn't make it into Wheezy. It has to be installed manually (works well). I am also open for other clients.

Another advantage is, that any Bitcoin client, no matter if it has proxy settings or not, can be used safely over Tor. I am currently looking at and into electrum.

Whatever you wanted to do over Tor, it likely works well and safely in Whonix. Of course it inherits all weaknesses of Tor (exit node sniffing...), but it makes it much harder to misconfigure something on your side.

Please give me feedback about Whonix and free your mind about a future Bitcoin integration.

Homepage with documentation:
https://www.whonix.org

Screenshots:
https://whonix.org/wiki/Screenshots

Announcement:
https://lists.torproject.org/pipermail/tor-talk/2012-October/025921.html

Connectivity is very good. Hidden services can be connected without proxy settings, without torsocks etc.
Code:
~ $ nslookup idnxcnkne4qt76tg.onion
Server:         192.168.0.10
Address:        192.168.0.10#53

Non-authoritative answer:
Name:   idnxcnkne4qt76tg.onion
Address: 10.192.0.2


/usr/bin/wget 10.192.0.2
--2012-10-20 02:49:00--  http://10.192.0.2/
Connecting to 10.192.0.2:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 492 [text/html]
Saving to: `index.html.1'

100%[==========================================================================================================================================>] 492         2.25K/s   in 0.2s    

2012-10-20 02:49:13 (2.25 KB/s) - `index.html.1' saved [492/492]


/usr/bin/wget http://idnxcnkne4qt76tg.onion/
--2012-10-20 02:50:21--  http://idnxcnkne4qt76tg.onion/
Resolving idnxcnkne4qt76tg.onion (idnxcnkne4qt76tg.onion)... 10.192.0.2
Connecting to idnxcnkne4qt76tg.onion (idnxcnkne4qt76tg.onion)|10.192.0.2|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 14440 (14K) [text/html]
Saving to: `index.html.2'

100%[==========================================================================================================================================>] 14,440      --.-K/s   in 0.1s    

2012-10-20 02:50:44 (95.5 KB/s) - `index.html.2' saved [14440/14440]
Jump to: