View Single Post
Old 07-06-2013, 02:24 PM  
PhoneSexKing
Confirmed User
 
PhoneSexKing's Avatar
 
Industry Role:
Join Date: Jun 2013
Location: a frozen wasteland
Posts: 190
Quote:
Originally Posted by adultmobile View Post
If fact whonix is cool because it runs 2 linux (debian) machines in virtualbox, one the gateway with tor, and then another the workstation who connect to the gateway, and the workstation vm have no idea what's the own IP or even ethernet MAC address (remember every ethernet got an unique id - if they get it then come your home they can verify it was your hardware being used to flow traffic).
This only works until there is an 0day for that vm and an attacker gains ring0 privs. It is hard to do, but I've seen successful vm exploits.

To quote Theo de Raadt: "You are absolutely deluded, if not stupid, if you think that a worldwide collection of software engineers who can't write operating systems or applications without security holes, can then turn around and suddenly write virtualization layers without security holes."

A separate computer (to do your routing/Torification) with its own memory/MMU/CPU is always more secure.
PhoneSexKing is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote