Runion

This is a sample guest message. Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Search results

  1. K

    Необходимость редактирования настроек Whonix-workstation?

    Somebody could be pulling out a MITM attack, but if you are using a secure connection between you and another endpoint, you will be fine. If you use a VPN, the VPN will be the MITM. Sure, you can connect to the internet using the modem alone, but you will not be able to use more devices in your...
  2. K

    Необходимость редактирования настроек Whonix-workstation?

    Three. It's the same as the Tor Browser (it's hardcoded here). ENTRY_NODE -> MIDDLE_NODE -> EXIT_NODE. Open up Nyx and execute getinfo circuit-status to see the Tor Circuit. Remember that you can't see it in Whonix's Tor Browser for security reasons) When adding another Tor Circuit, make sure...
  3. K

    Необходимость редактирования настроек Whonix-workstation?

    As always... It depends. Imagine you're a criminal that connects to its own VPN to route the connection through Tor (Tor over VPN: YOU -> VPN -> TOR)... For example, they could try to get in into your VPN server to check if there are any kind of logs, residual data, current traffic, unsecured...
  4. K

    Необходимость редактирования настроек Whonix-workstation?

    Коллеги подскажите пожалуйста ответ на вопрос, реализуя цепочки vpn1 - whonix - vpn2, насколько важно изменять настройки в whonix workstation согласно гайду на официальном сайте whonix? В курсе paranoid написано, что можно просто подключаться используя openvpn без доп настроек whonix firewall и...
  5. K

    Недорогой абузоустойчивый хостинг с игнором spamhaus/cert от Xboost

    Debian можно поставить? Сколько аренда в месяц?
Top