Главная
Study mode:
on
1
Countdown
2
Intro
3
What is C3?
4
Sugar Girl Story
5
What is Whonix?
6
Getting Started with Whonix
7
Whonix Virtual Box
8
VPNs with Tor
9
Virtual Machine Up and Running
10
Trying to Track Whonix
11
How it Protects Your IP
12
Routing Apps over Tor
13
Tor Exit Nodes being Blocked
14
How Could you get Caught/Fingerprinted?
15
Tracking the Tor Node
16
Next Steps after Install
17
Qubes vs. Whonix
18
A Catastrophe
19
Closing Thoughts
20
Endscreen
Description:
Explore the privacy-focused operating system Whonix in this 45-minute video featuring Kody and special guest James. Dive into the world of hacker operating systems, learning about C3, the Sugar Girl story, and the fundamentals of Whonix. Discover how to get started with Whonix, set up a virtual box, and understand the relationship between VPNs and Tor. Examine the process of tracking Whonix, how it protects your IP, and the intricacies of routing apps over Tor. Investigate potential vulnerabilities, including fingerprinting and tracking Tor nodes. Compare Whonix with Qubes OS and gain insights on next steps after installation. Conclude with closing thoughts and a brief discussion of a catastrophic event, providing a comprehensive overview of this privacy-enhancing technology.

Exploring Hacker Operating Systems - Whonix

SecurityFWD
Add to list