I’m curious if whonix actually provides any value rather than just running tor locally?

Like has there ever been a case when because tor was run locally on someones computer over using whonix for tor that they were compromised?

  • ghost_laptop@lemmy.ml
    link
    fedilink
    arrow-up
    0
    ·
    3 years ago

    I guess since they weren’t caught there’s nothing to report about it so we probably wouldn’t know… so I assume yes. Also Whonix works in perfect combination with QubesOS, so at that level of opsec is fucking hella hard to caught someone, IMO.

    • relejek@lemmy.ml
      link
      fedilink
      arrow-up
      0
      ·
      edit-2
      3 years ago

      This. When the safety tool/system is so good that you don’t realise if it is working or not. I think a better question would be “whether anyone was compromised while* using it?”

      Edit: a word.

  • TheAnonymouseJoker@lemmy.mlM
    link
    fedilink
    arrow-up
    0
    arrow-down
    5
    ·
    edit-2
    3 years ago

    Whonix is fine for operating sockpuppet account workflow, as example. Realistically, good luck getting to a TailsOS USB user with a solid opsec.