Whonix-Love 0 Posted ... Hi, Whonix community here, Whonix is an anonymous operating system that anonymizes traffic through the Tor network. It has a unique design that uses two VMs: one for your work, called the Workstation, which is connected to another VM that serves as a router, called the Gateway. This design prevents the Workstation from leaking your real IP address (even if you have infected by a malware). It has many other advanced features, such as the ability to boot into live or persistent mode, better design for hidden services protection..etc. We share the same values as AirVPN regarding user privacy and information security. We also cover how to connect to Tor before a VPN, or vice versa: https://www.whonix.org/wiki/Tunnels/Connecting_to_Tor_before_a_VPN https://www.whonix.org/wiki/Tunnels/Connecting_to_a_VPN_before_Tor Of course, we also cover in our wiki the design limitations of VPNs (which can’t be fully solved). However, a VPN can still be useful in certain cases, such as bypassing Tor blocks by an ISP or bypassing websites that block direct Tor connections. The project is nonprofit, and our software is fully free software under the GPL license. Hopefully this is a nice brief introduction, and if you have any questions, please feel free to ask. ThX! Quote Share this post Link to post
Staff 10394 Posted ... 21 hours ago, Whonix-Love said: a VPN can still be useful in certain cases, such as bypassing Tor blocks by an ISP or bypassing websites that block direct Tor connections. Hello and welcome! Another interesting use case is when you live in a country where trying to access the Tor network raises a red flag on you but the HTTP/3 (QUIC) traffic does not. So you first circumvent the blocks via some adequate VPN related protocol that looks like QUIC and only then you fire up Tor, so the regime can't trivially infer that you're trying to use Tor. Sometimes it is more practical and safer than struggling to find Tor bridges: a risk assessment is due, on a case by case basis. Kind regards 1 Whonix-Love reacted to this Quote Share this post Link to post
Whonix-Love 0 Posted ... 13 hours ago, Staff said: Hello and welcome! Hey! Thanks 13 hours ago, Staff said: So you first circumvent the blocks via some adequate VPN related protocol that looks like QUIC and only then you fire up Tor, so the regime can't trivially infer that you're trying to use Tor. Sometimes it is more practical and safer than struggling to find Tor bridges: a risk assessment is due, on a case by case basis. Yep like you said, if the user is going to use a VPN anyway before Tor, then whatever works and makes them look less suspicious is better. If anyone is interested in documenting AirVPN on the Whonix Gateway (before and/or after Tor), hit me up anytime we can arrange it. Quote Share this post Link to post