Advertisement
Guest User

Untitled

a guest
Nov 11th, 2019
122
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.58 KB | None | 0 0
  1. Username 1: <Username>
  2. Username 2: <Username>
  3.  
  4. Task 1
  5. ======
  6. Part 1:
  7.  
  8. It differs from Whonix in that its designed to run on a USB drive. Additionally it only uses a single machine compare to two of Whonix.
  9.  
  10. - USB drive with their own operating system on it, such as tails
  11. - Disposable PC and USB drive with tails
  12. - Tor browser with bridges
  13.  
  14.  
  15. -
  16. Part 2:
  17.  
  18. yes it warns me
  19. tor browser, pgp, keepass
  20. tor browser can be used as both
  21.  
  22. -
  23. Part 3:
  24.  
  25. much slower loading times, often captchas
  26.  
  27. yes, just visit check.torproject.org
  28.  
  29.  
  30.  
  31. -
  32. Part 4:
  33.  
  34. my windows:
  35. -blocks tracking ads
  36. -blocks invisible trackers
  37. -does not protect from fingerprinting,
  38.  
  39. my tails:
  40. -blocks ads
  41. -blocks invis trackers
  42. -partial protection from fingerprinting
  43.  
  44. ip checks:
  45. windows: unhidden, knows my location and info
  46. tor: hidden using tor
  47.  
  48. -
  49. Part 5:
  50.  
  51. Task 2
  52. ======
  53. Part 6:
  54.  
  55. categories:
  56. - darknet markets, e.g. empire market
  57. - hacking forums, e.g. nulled
  58. - whistleblowing, e.g. globaleaks
  59. - torrents, e.g. piratebay
  60. - anonymous email, e.g. protonmail
  61.  
  62. -
  63. Part 7:
  64.  
  65. http, irc, ssh, any type of service
  66.  
  67. -
  68. Part 8:
  69.  
  70. tor search engines:
  71. Torch: xmh57jrzrnw6insl.onion
  72. Not evil: hss3uro2hsxfogfq.onion
  73. AHMIA: msydqstlz2kzerdg.onion
  74. Grams: grams7enufi7jmdl.onion
  75.  
  76. to develop malware, search for blackhat forums
  77.  
  78. -
  79. Part 9:
  80.  
  81. no its not enough, need to disable javascript and if possible hide behind a vpn.
  82. your ISP can still see tor traffic.
  83.  
  84. Task 3
  85. ======
  86. Part 10:
  87.  
  88. a Gateway: runs tor, has two network interfaces. One is connected to internet via NAT used to connect to tor relays. Other is a virtual LAN, used to connect to Whonix Workstation.
  89.  
  90. b Workstation: runs user applications. Only has a virtual LAN interface and can only communicate with the Gateway. Forces all traffic from the workstation to pass through the Tor network.
  91.  
  92. c Advantages:
  93. - user applications have no knowledge of the user's real ip address.
  94. - workstation has no information about the physical hardware.
  95.  
  96. d First of all it's already checked on each boot.
  97. But we can also check by going to check.torproject.org
  98. Can also run the WhonixCheck application
  99.  
  100. e I can confirm that the traffic is going through Tor
  101.  
  102. f Absolutely not. The gateway should only be used to run tor and communicate with the workstation. It is designed to act as a firewall and run tor.
  103.  
  104. g
  105. - User mistakes.
  106. - Social engineering.
  107. - Anonymous traffic previously used without tor
  108. - Same username as real-life identity or clear-web identity.
  109.  
  110.  
  111. -
  112. Part 11:
  113.  
  114. Task 4
  115. ======
  116. Part 12:
  117.  
  118. -
  119. Part 13:
  120.  
  121. -
  122. Part 14:
  123.  
  124. -
  125. Part 15:
  126.  
  127. -
  128. Part 16:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement