Setting Up Whonix for ANONYMOUS Tor Browsing (Dark Web Documentary #06)
Vložit
- čas přidán 23. 08. 2022
- Help the channel grow with a Like, Comment, & Subscribe!
❤️ Support ➡ j-h.io/patreon ↔ j-h.io/paypal ↔ j-h.io/buymeacoffee
Check out the affiliates below for more free or discounted learning!
🖥️ Zero-Point Security ➡ Certified Red Team Operator j-h.io/crto
💻Zero-Point Security ➡ C2 Development with C# j-h.io/c2dev
🐜Zero2Automated ➡ Ultimate Malware Reverse Engineering j-h.io/zero2auto
🐜Zero2Automated ➡ MISP & Malware Sandbox j-h.io/zero2auto-sandbox
⛳Point3 ESCALATE ➡ Top-Notch Capture the Flag Training j-h.io/escalate
👨🏻💻7aSecurity ➡ Hacking Courses & Pentesting j-h.io/7asecurity
📗Humble Bundle ➡ j-h.io/humblebundle
🐶Snyk ➡ j-h.io/snyk
🤹♀️SkillShare ➡ j-h.io/skillshare
🌎Follow me! ➡ j-h.io/discord ↔ j-h.io/twitter ↔ j-h.io/linkedin ↔ j-h.io/instagram ↔ j-h.io/tiktok
📧Contact me! (I may be very slow to respond or completely unable to)
🤝Sponsorship Inquiries ➡ j-h.io/sponsorship
🚩 CTF Hosting Requests ➡ j-h.io/ctf
🎤 Speaking Requests ➡ j-h.io/speaking
💥 Malware Submission ➡ j-h.io/malware
❓ Everything Else ➡ j-h.io/etc
Finally, this series is so good, I really like this content.
As a fellow security researcher I want to point out that i also do cyber threat intel. I have a few thoughts on this video. 1. Great job making this as simple as following the Whonix instruction manual and setting up Virtualbox. It's truly one of the more simple VM setups and doesn't really require additional steps aside from CPU and RAM bumps, and maybe some separate isolation tricks. 2. You should know that just by using Whonix, you're not entirely anonymous. Anonymity is harder to achieve and you must change your behavior while using operating systems such as Whonix and Qubes. I daily drive Qubes OS and even using that is not simply plug-and-play. There are still many things to consider than just using Tor and having a separate VM like the Whonix Gateway. You should never put all your eggs into one basket. This is a great start and I hope to see more about this type of content from you. Thanks for the great content as always!
@@UNcommonSenseAUS He also shills his own "private & secure" phone, and half his content is inaccurate or plain wrong.
@@ShadowImpressive what of his content is wrong?
@@haveaniceday7950 ** crickets ** another YT commenter talking crap again
yo u are a security researches what programming language do you know and what would u recommend for beginners to learn like tutorials read books etc
@@devangverma9632 better off finding a forum to ask for that lol. how'd the assignment go?
This video is great thanks john for your pedagogy and humilty
Super cool John. Keep up the good Work
please keep this series on going that would be great
!!!
how do u manage to create so much content omg, props to you dude
dude im a total newb on computers and by following your teachings i got it , wow im so stoked thank you subbed and thumbs😃thank you so much
thanks for this video, john❤
John, could we potentially see a video on host/hypervisor isolation?
I second this.
yes please
That would be awesome.
+1
Yes please
ok ... documentary is back... thanks :)
👍Thanks John.
Expert technology made to look easy... Loved it... I gave a like but I miss the malware analysis. 👍👁️👁️👍
The most important step forgotten:
1. UPDATE!
sick dude ty ill use that
Good guide.
It's worth noting some outdated versions of VirtualBox 6.x are completely broken when Hyper-V is enabled in Windows (which is the default configuration, and I wouldn't recommend changing it). So if Whonix doesn't boot for you and kernel panics, or runs very slowly and only with specific VM configurations such as disabling some virtualization settings or only using 1 CPU core, make sure you're running an up-to-date VirtualBox. At the very least you can be sure the latest 6.x works.
Love you too homie
I heard that changing the browser size may help identify you. Best to use the defaults is what I heard from the grape vine.
Which one is the safer? Tails or Whonix OS?
hi john, Is there any Content creator that does Cyber threat intel ?
Which would you recommend between tails and whonix
Whonix is more suited for everyday leave on your computer. Tails is for anywhere, anytime, while traveling, etc. If you want to wipe your everything after unplugging, then tails is what you want. You can make saves in Whonix and has more options to configure inside your OS. There's whonix live mode. Up to you
What is better tails or whonix
oh yeah we are back to get our hands dirty :)
🙂
Hello. There is something that I dont understand. I followed the steps and all is running well, but the only fact that Whonix is running on my Windows 10, all my connections will be anonymous? for example my tabs on Google Chrome and Edge? Thanks!
What difference with KVM installation ? Is KVM safer ?
why you didn't run update and upgrade dist command? 🤔
Do we need to disable javascript while using tor through whonix?
I would recommend YES 100000% cause some sites could force download malware through js just by going to the website and such.
What about unwanted leaks to Tor network? I mean AFAIK that just a Tor proxy.
setting up to an usb is way better i think.
How much storage do you think is needed for usb?
@@celestinetoussaint6350 a 8 GB usb is enough
Just a quick note, I've heard from uh certain sources that Whonix is not that secure on Windows and it's best to do it on a debian Linux distribution
Nothing is that secure on Windows.
@@butmunchass Unfortunately that is very true
VBox isn't secure either. Best to use Virt Manager
John, I love you too
How do I use my proxy with this ?
What kind of drug can i buy in whonix?
duude 2 gig in 2 min wow
❤
weird glitch around @4:40 when you're talking about some law stuff.
This isn't my real IP guys, proceeds to blur out IP lmaooo
I personally use KODACHI OS for this
Whonix isn't working right now. If you try to load it in virtual box it just aborts now, but it used to work. Whonix might be dead. Switching to TailsOS
I don't know. Tails is better ?
actually i hit a wall i need to change the clock time and cant seem to find an options menu for it ggrrrrrr
Just a note - update Debian and change the default user/password
The Utopia P2P browser stands out in terms of online privacy, surpassing other VPN services. With its wide network of fast and free web proxies, it guarantees a seamless browsing experience while maintaining strong encryption to keep your data secure.
First like 😀
Does the govt fund it like Tails?
what's the difference with using Brave TOR?
Since your devices around you snitches and report all Mac addresses, how does anyone this protect you?
Sir can we change ip address of kali linux
😂😂🤣🤣🤣
Ayyy first
I did my first thm koth today, and absolutely enihalated my opponent.
Look at mobile malware
windows os
virtualbox
uses whonix
LMFAO
it amazing me that the like to dislike ratio is not incredibly fked. Just goes to show what kind of people watch this content
Not for the newbie
What if I use a proxychain with tor in the chain on a virtual box machine with expressvpn on the host device? Am I anonymous then???
Best thing to do is book a flight to China, get a hotel, setup your PC. Do the techy stuff. Once your done. Move back 🏡 👍
in case you aren't joking. Don't use a VPN
@@DD-vp7fz why not?
@@DD-vp7fz ?
@@_barncat they will know what you do and if the government asks for the VPN company to show your data in case you're doing something illegal they'll allow
You want not for cyber expert
Hey Dorothy, your in color tv! The internet is on the radio anymore. Color tv will never be a thing anyway.
609k subs. 69. Lol
Anonymity doesnt exist by design. That's just not how the
majority of the Internet works.
For 30% of you, the best you'll achieve is obfuscation. And VPNs are not anonymising cloaks.
Crumbs are left everywhere. Digital fingerprints are left everywhere. Thats how the best of the best were caught in the past, and that's how they'll be caught in the future.
It takes a special kind of OCD to maintain the required level of meticulous dedication to detail to truly be anonymous online without resorting to extreme hardware mods or military grade / 3LA equipment.
For the other 69%, well you're out in the open under a false sense of security thinking you're unseen, but actually sticking out like a huge red beacon calling the mothership down.
Ah yee, it takes a special kind of miserable paranoid in need of severe psychological help kind of person to monitor everything all at once every second. How exhausting must that be. Poor soul
Files app5 colors,tool house job handling html, comment Box,index, tools , URL,grpoing
First viewer
What a pity it is just a quick blablabla video without any deeper information. To run a browser via Tor you could simply use the Tor browser. Or install the Tor service and configure that as a proxy. Any benefits that this distro might have (and what I am trying to find out) is just not mentioned here.
well yeah lol did u read the title
ehhe. Script kiddie tutorials from you.
When it comes to privately browsing the dark web, I always trust ORACLE as a trustworthy software layer 🤣😂😅
closed source FTW LOLL