Jump to content
Not connected, Your IP: 216.73.216.108

Recommended Posts

Hi, Whonix community here,
 

Whonix is an anonymous operating system that anonymizes traffic through the Tor network. It has a unique design that uses two VMs: one for your work, called the Workstation, which is connected to another VM that serves as a router, called the Gateway. This design prevents the Workstation from leaking your real IP address (even if you have infected by a malware). It has many other advanced features, such as the ability to boot into live or persistent mode, better design for hidden services protection..etc.


We share the same values as AirVPN regarding user privacy and information security. We also cover how to connect to Tor before a VPN, or vice versa: 

https://www.whonix.org/wiki/Tunnels/Connecting_to_Tor_before_a_VPN

https://www.whonix.org/wiki/Tunnels/Connecting_to_a_VPN_before_Tor
 

Of course, we also cover in our wiki the design limitations of VPNs (which can’t be fully solved). However, a VPN can still be useful in certain cases, such as bypassing Tor blocks by an ISP or bypassing websites that block direct Tor connections.


The project is nonprofit, and our software is fully free software under the GPL license. Hopefully this is a nice brief introduction, and if you have any questions, please feel free to ask.

ThX!
 

Share this post


Link to post
21 hours ago, Whonix-Love said:

a VPN can still be useful in certain cases, such as bypassing Tor blocks by an ISP or bypassing websites that block direct Tor connections.


Hello and welcome!

Another interesting use case is when you live in a country where trying to access the Tor network raises a red flag on you but the HTTP/3 (QUIC) traffic does not. So you first circumvent the blocks via some adequate VPN related protocol that looks like QUIC and only then you fire up Tor, so the regime can't trivially infer that you're trying to use Tor. Sometimes it is more practical and safer than struggling to find Tor bridges: a risk assessment is due, on a case by case basis.

Kind regards
 

Share this post


Link to post
13 hours ago, Staff said:

Hello and welcome!


Hey! Thanks
 
13 hours ago, Staff said:

So you first circumvent the blocks via some adequate VPN related protocol that looks like QUIC and only then you fire up Tor, so the regime can't trivially infer that you're trying to use Tor. Sometimes it is more practical and safer than struggling to find Tor bridges: a risk assessment is due, on a case by case basis.


Yep like you said, if the user is going to use a VPN anyway before Tor, then whatever works and makes them look less suspicious is better.
 

If anyone is interested in documenting AirVPN on the Whonix Gateway (before and/or after Tor), hit me up anytime we can arrange it.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...