As a fellow security researcher I want to point out that i also do cyber threat intel. I have a few thoughts on this video. 1. Great job making this as simple as following the Whonix instruction manual and setting up Virtualbox. It's truly one of the more simple VM setups and doesn't really require additional steps aside from CPU and RAM bumps, and maybe some separate isolation tricks. 2. You should know that just by using Whonix, you're not entirely anonymous. Anonymity is harder to achieve and you must change your behavior while using operating systems such as Whonix and Qubes. I daily drive Qubes OS and even using that is not simply plug-and-play. There are still many things to consider than just using Tor and having a separate VM like the Whonix Gateway. You should never put all your eggs into one basket. This is a great start and I hope to see more about this type of content from you. Thanks for the great content as always!
It's worth noting some outdated versions of VirtualBox 6.x are completely broken when Hyper-V is enabled in Windows (which is the default configuration, and I wouldn't recommend changing it). So if Whonix doesn't boot for you and kernel panics, or runs very slowly and only with specific VM configurations such as disabling some virtualization settings or only using 1 CPU core, make sure you're running an up-to-date VirtualBox. At the very least you can be sure the latest 6.x works.
Whonix is more suited for everyday leave on your computer. Tails is for anywhere, anytime, while traveling, etc. If you want to wipe your everything after unplugging, then tails is what you want. You can make saves in Whonix and has more options to configure inside your OS. There's whonix live mode. Up to you
Hello. There is something that I dont understand. I followed the steps and all is running well, but the only fact that Whonix is running on my Windows 10, all my connections will be anonymous? for example my tabs on Google Chrome and Edge? Thanks!
@@_barncat they will know what you do and if the government asks for the VPN company to show your data in case you're doing something illegal they'll allow
@@_barncat A very short answer: Because you are routing your connection through a company that you cannot verify if they are handling their data correctly or are working with the government. Also, don't use TOR in combination with a VPN. TOR has an explanation in their manual or on their website.
The Utopia P2P browser stands out in terms of online privacy, surpassing other VPN services. With its wide network of fast and free web proxies, it guarantees a seamless browsing experience while maintaining strong encryption to keep your data secure.
windows os virtualbox uses whonix LMFAO it amazing me that the like to dislike ratio is not incredibly fked. Just goes to show what kind of people watch this content
Anonymity doesnt exist by design. That's just not how the majority of the Internet works. For 30% of you, the best you'll achieve is obfuscation. And VPNs are not anonymising cloaks. Crumbs are left everywhere. Digital fingerprints are left everywhere. Thats how the best of the best were caught in the past, and that's how they'll be caught in the future. It takes a special kind of OCD to maintain the required level of meticulous dedication to detail to truly be anonymous online without resorting to extreme hardware mods or military grade / 3LA equipment. For the other 69%, well you're out in the open under a false sense of security thinking you're unseen, but actually sticking out like a huge red beacon calling the mothership down.
Ah yee, it takes a special kind of miserable paranoid in need of severe psychological help kind of person to monitor everything all at once every second. How exhausting must that be. Poor soul
What a pity it is just a quick blablabla video without any deeper information. To run a browser via Tor you could simply use the Tor browser. Or install the Tor service and configure that as a proxy. Any benefits that this distro might have (and what I am trying to find out) is just not mentioned here.
As a fellow security researcher I want to point out that i also do cyber threat intel. I have a few thoughts on this video. 1. Great job making this as simple as following the Whonix instruction manual and setting up Virtualbox. It's truly one of the more simple VM setups and doesn't really require additional steps aside from CPU and RAM bumps, and maybe some separate isolation tricks. 2. You should know that just by using Whonix, you're not entirely anonymous. Anonymity is harder to achieve and you must change your behavior while using operating systems such as Whonix and Qubes. I daily drive Qubes OS and even using that is not simply plug-and-play. There are still many things to consider than just using Tor and having a separate VM like the Whonix Gateway. You should never put all your eggs into one basket. This is a great start and I hope to see more about this type of content from you. Thanks for the great content as always!
@@UNcommonSenseAUS He also shills his own "private & secure" phone, and half his content is inaccurate or plain wrong.
@@ShadowImpressive what of his content is wrong?
@@haveaniceday7950 ** crickets ** another YT commenter talking crap again
yo u are a security researches what programming language do you know and what would u recommend for beginners to learn like tutorials read books etc
@@devangverma9632 better off finding a forum to ask for that lol. how'd the assignment go?
John, could we potentially see a video on host/hypervisor isolation?
I second this.
yes please
That would be awesome.
+1
Yes please
dude im a total newb on computers and by following your teachings i got it , wow im so stoked thank you subbed and thumbs😃thank you so much
Finally, this series is so good, I really like this content.
how do u manage to create so much content omg, props to you dude
Great video ! One question please: should I follow the same procedure if I want to create multiple Whonix VMs on the same host? Thanks!
please keep this series on going that would be great
!!!
I heard that changing the browser size may help identify you. Best to use the defaults is what I heard from the grape vine.
It's worth noting some outdated versions of VirtualBox 6.x are completely broken when Hyper-V is enabled in Windows (which is the default configuration, and I wouldn't recommend changing it). So if Whonix doesn't boot for you and kernel panics, or runs very slowly and only with specific VM configurations such as disabling some virtualization settings or only using 1 CPU core, make sure you're running an up-to-date VirtualBox. At the very least you can be sure the latest 6.x works.
This video is great thanks john for your pedagogy and humilty
Just a quick note, I've heard from uh certain sources that Whonix is not that secure on Windows and it's best to do it on a debian Linux distribution
Nothing is that secure on Windows.
@@butmunchass Unfortunately that is very true
VBox isn't secure either. Best to use Virt Manager
The most important step forgotten:
1. UPDATE!
how????
@@9.blockneef open terminal. sudo apt-get-update-plus dist-upgrade
@@9.blockneef sudo apt update && apt -full-upgrade
Which would you recommend between tails and whonix
Whonix is more suited for everyday leave on your computer. Tails is for anywhere, anytime, while traveling, etc. If you want to wipe your everything after unplugging, then tails is what you want. You can make saves in Whonix and has more options to configure inside your OS. There's whonix live mode. Up to you
What is better tails or whonix
Super cool John. Keep up the good Work
thanks for this video, john❤
What difference with KVM installation ? Is KVM safer ?
ok ... documentary is back... thanks :)
Do we need to disable javascript while using tor through whonix?
I would recommend YES 100000% cause some sites could force download malware through js just by going to the website and such.
weird glitch around @4:40 when you're talking about some law stuff.
Hello. There is something that I dont understand. I followed the steps and all is running well, but the only fact that Whonix is running on my Windows 10, all my connections will be anonymous? for example my tabs on Google Chrome and Edge? Thanks!
setting up to an usb is way better i think.
How much storage do you think is needed for usb?
@@celestinetoussaint6350 a 8 GB usb is enough
why you didn't run update and upgrade dist command? 🤔
👍Thanks John.
I don't know. Tails is better ?
Which one is the safer? Tails or Whonix OS?
What about unwanted leaks to Tor network? I mean AFAIK that just a Tor proxy.
What kind of drug can i buy in whonix?
hi john, Is there any Content creator that does Cyber threat intel ?
Expert technology made to look easy... Loved it... I gave a like but I miss the malware analysis. 👍👁️👁️👍
Love you too homie
What if I use a proxychain with tor in the chain on a virtual box machine with expressvpn on the host device? Am I anonymous then???
in case you aren't joking. Don't use a VPN
@@DD-vp7fz why not?
@@DD-vp7fz ?
@@_barncat they will know what you do and if the government asks for the VPN company to show your data in case you're doing something illegal they'll allow
@@_barncat A very short answer: Because you are routing your connection through a company that you cannot verify if they are handling their data correctly or are working with the government.
Also, don't use TOR in combination with a VPN. TOR has an explanation in their manual or on their website.
what's the difference with using Brave TOR?
oh yeah we are back to get our hands dirty :)
🙂
This isn't my real IP guys, proceeds to blur out IP lmaooo
Does the govt fund it like Tails?
sick dude ty ill use that
How do I use my proxy with this ?
Good guide.
Sir can we change ip address of kali linux
😂😂🤣🤣🤣
actually i hit a wall i need to change the clock time and cant seem to find an options menu for it ggrrrrrr
John, I love you too
The Utopia P2P browser stands out in terms of online privacy, surpassing other VPN services. With its wide network of fast and free web proxies, it guarantees a seamless browsing experience while maintaining strong encryption to keep your data secure.
Just a note - update Debian and change the default user/password
I personally use KODACHI OS for this
windows os
virtualbox
uses whonix
LMFAO
it amazing me that the like to dislike ratio is not incredibly fked. Just goes to show what kind of people watch this content
Why not contribute your knowledge instead of being condescending?
You want not for cyber expert
Hey Dorothy, your in color tv! The internet is on the radio anymore. Color tv will never be a thing anyway.
duude 2 gig in 2 min wow
First like 😀
I did my first thm koth today, and absolutely enihalated my opponent.
Look at mobile malware
Not for the newbie
Anonymity doesnt exist by design. That's just not how the
majority of the Internet works.
For 30% of you, the best you'll achieve is obfuscation. And VPNs are not anonymising cloaks.
Crumbs are left everywhere. Digital fingerprints are left everywhere. Thats how the best of the best were caught in the past, and that's how they'll be caught in the future.
It takes a special kind of OCD to maintain the required level of meticulous dedication to detail to truly be anonymous online without resorting to extreme hardware mods or military grade / 3LA equipment.
For the other 69%, well you're out in the open under a false sense of security thinking you're unseen, but actually sticking out like a huge red beacon calling the mothership down.
Ah yee, it takes a special kind of miserable paranoid in need of severe psychological help kind of person to monitor everything all at once every second. How exhausting must that be. Poor soul
❤
Ayyy first
609k subs. 69. Lol
Files app5 colors,tool house job handling html, comment Box,index, tools , URL,grpoing
What a pity it is just a quick blablabla video without any deeper information. To run a browser via Tor you could simply use the Tor browser. Or install the Tor service and configure that as a proxy. Any benefits that this distro might have (and what I am trying to find out) is just not mentioned here.
well yeah lol did u read the title
First viewer
ehhe. Script kiddie tutorials from you.
When it comes to privately browsing the dark web, I always trust ORACLE as a trustworthy software layer 🤣😂😅
closed source FTW LOLL