Whonix ™

@Whonix

Anonymous Operating System - boot into live mode or persistent mode -

based on Kicksecure ™
Vrijeme pridruživanja: listopad 2012.

Tweetovi

Blokirali ste korisnika/cu @Whonix

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Whonix

  1. proslijedio/la je Tweet
    9. sij

    Having finished some implementation steps of zharf I could find some time to get back to tirdad and make some changes. I removed userspace loader and the module can now be directly installed independently.

    Poništi
  2. 6. sij

    It is possible to help users in censored countries to connect to the Tor network by embedding a single line of code on your website. See: Let's free the living daylights out of the internet together. ^HU

    Poništi
  3. 6. sij

    Search bubbling forever traps you in illusions with no way to refute the delusions. Use Tor yesterday. ^HU

    Poništi
  4. proslijedio/la je Tweet
    Odgovor korisnicima i sljedećem broju korisnika:

    I use Qubes and a Whonix gateway literally everyday, but you can't simply throw Qubes at a non-technical journalist and have them not get you arrested. Qubes is intended for people who understand how a network operates and what a virtual machine is. Most journalists don't.

    Poništi
  5. 31. pro 2019.

    A shout out to all our wonderful contributors and especially the bright and kind researchers who gave us their time to make the world a safer and better place. Have a happy 2020 ^HU

    Poništi
  6. 31. pro 2019.

    My New Year resolution is to introduce Tor and Whonix to at least two new people this year. Hopefully we can save a few more necks from the tightening noose of permanent surveillance. ^HU

    Poništi
  7. proslijedio/la je Tweet

    To provide privacy to users, some Linux-based OSs utilize the Tor network in part to do so: , , and . To securely and anonymously share files, there's OnionShare by . Orbot by allows you to route Android traffic over Tor.

    Prikaži ovu nit
    Poništi
  8. 29. pro 2019.

    "Assumption 3.We assume that only devices honestly following the protocol can be unlocked using the JJE exceptional access protocol" If people can freely chose what code to run, they can go for designs without this access mechanism leaving you with your dick in your hand. ^HU 4/4

    Prikaži ovu nit
    Poništi
  9. 29. pro 2019.

    "Assumption 2.We assume that the only two ways to unlock a device is through the intended mechanism (i.e., by providing a password) and the JJE exceptional access protocol." OK a perfect hardware and software stack... I'll bite ^HU 3/4

    Prikaži ovu nit
    Poništi
  10. 29. pro 2019.

    "Assumption 1.We assume that tamper-reistant, secure en-claves exists and are free of vulnerabilities." Impossible without vetted open hw designs and personal chip fabs to ensure against hardware backdoors. Every similar tech in the space was broken SGX, TPM, TrustZone ^HU 2/4

    Prikaži ovu nit
    Poništi
  11. 29. pro 2019.

    A very interesting thought experiment for transparent exceptional access that doesn't directly sabotage the ciphers and delegates access to diverse institutions, but the assumptions are greatly flawed ^HU 1/4

    Prikaži ovu nit
    Poništi
  12. 29. pro 2019.

    Season's greetings from General Nakasone and Bill Gates. Stay safe out there ^HU

    Poništi
  13. 29. pro 2019.

    How to jam the spy on your neighbor's porch ^HU

    Poništi
  14. 29. pro 2019.

    We disable systemd's resolver in Whonix BTW ^HU

    Prikaži ovu nit
    Poništi
  15. 29. pro 2019.
    Prikaži ovu nit
    Poništi
  16. 29. pro 2019.

    Boost workplace productivity with this one simple trick! ^HU

    Poništi
  17. 29. pro 2019.

    Like "Cloud", "AI", and "Blockchain", Quantum has been mercilessly bastardized by idiots and morally bankrupt "researchers" who want to scam government/corp funds for snakeoil experiments or inventions. Let be your guiding light when educating yourself ^HU

    Poništi
  18. 29. pro 2019.
    Poništi
  19. 29. pro 2019.
    Poništi
  20. proslijedio/la je Tweet
    18. pro 2019.

    .’ hardened SecBrowser certainly is a good browser to have and use. It only protects from fingerprinting on its most strict settings (according to a few tests with Panopticlick) but it also offers increased security out of the box.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·