{{Header}} {{#seo: |description=List of notable reviews and feedback about the security of {{project_name_long}}. |image=Reviews.png }} [[File:Reviews.png|thumb|200px]] {{intro| This is a list of notable reviews and feedback about {{project_name_short}} security. }} See also [[Whonix_against_Real_Attacks|{{project_name_short}} Protection against Real World Attacks]]. == Reviews == * [https://web.archive.org/web/20200712221931/https://corelight.blog/2019/07/18/profiling-whonix/ corelight Bright Ideas Blog: Profiling Whonix] * Not an audit of {{project_name_short}} but an audit of software which is based on {{project_name_short}}: ** [https://securedrop.org/ ”SecureDrop]
SecureDrop is an open source whistleblower submission system that media organizations and NGOs can install to securely accept documents from anonymous sources. It was originally created by the late Aaron Swartz and is now managed by [https://freedom.press/ Freedom of the Press Foundation]. SecureDrop is available in [https://docs.securedrop.org/en/stable/admin/reference/securedrop_admin.html#updating-localization-for-the-source-interface-and-the-journalist-interface 20 languages].
Journalist Workstation [https://github.com/freedomofpress/securedrop-workstation environment for submission handling] is based on Qubes-Whonix.” ** [https://securedrop.org/news/third-party-audit-integrated-securedrop-workstation-completed/ Third party audit of integrated SecureDrop Workstation completed] * [https://lists.torproject.org/pipermail/tor-talk/2012-March/023531.html Cursory check of TorBOX] by the creator of [https://web.archive.org/web/20141217135247/http://www.janusvm.com/ JanusVM] (TorBOX was later renamed to {{project_name_short}}) * [https://github.com/QubesOS/qubes-issues/issues/2108#issuecomment-228379491 Quote] rustybird, author of [https://github.com/rustybird/corridor corridor, a Tor traffic whitelisting gateway]:
Happy to report no leaks observed, ever.
== Discussions == === Tor-talk === There are [https://lists.torproject.org/pipermail/tor-talk/2012-March/subject.html#23489 a few older threads] on the Tor Talk Mailing List concerning the security of {{project_name_short}} / transparent proxy: * [https://lists.torproject.org/pipermail/tor-talk/2012-March/023486.html tor-talk: Operating system updates / software installation behind Tor Transparent Proxy] * [https://lists.torproject.org/pipermail/tor-talk/2012-March/023519.html tor-talk: Obtain real IP behind Tor transparent proxy; was: Operating system updates / software installation behind Tor Transparent Proxy] * [https://lists.torproject.org/pipermail/tor-talk/2012-March/023531.html tor-talk: Risk with transparent proxy mode (was Re:Operating system updates / software installation behind Tor Transparent Proxy)] - In summary, coderman (developer of TorVM / JanusVM) had some concerns, which could be dispelled. "Looks fine from a cursory check." === Older References === This section is for older, general {{project_name_short}} discussion references. It is useful to capture people's thoughts and feedback concerning the project, even if feedback is secondhand and not provided directly. Most links are found by searching for "[https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorBOX TorBOX]". ----- '''TorBOX''' * [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorBOX/Dev/ArchivedDiscussion/QUESTIONS Dev/ArchivedDiscussion/QUESTIONS] * [https://html.duckduckgo.com/html?q=site%3Awilderssecurity.com%20TorBOX {{project_name_short}} on wilderssecurity.com]; a few threads exist * [https://ra.fnord.at/2011/05/easy-and-secure-anonymous-internet-usage/ ra's blog]; negative feedback - search for "TorBOX that they have" * LulzSec / AntiSecOp: [https://toodamnez.wordpress.com/2012/02/15/want-to-be-a-ghost-on-the-internet/ Want to be a ghost on the internet?]; {{project_name_short}} (TorBOX) is a part of their instructions ----- '''Early TorBOX and {{project_name_short}} Releases''' * [https://www.reddit.com/r/TOR/comments/tyabf/torbox_critical_issue_help/ reddit: torbox critical issue help]; this only applied to 0.1.3. A workaround was provided and a fix was announced and available from 0.2.0 onwards * October 2012 - {{project_name_short}} 0.4.5 release announcement ** [https://lists.torproject.org/pipermail/tor-talk/2012-October/025921.html tor-talk Mailing List: Whonix ALPHA 0.4.5 - Anonymous Operating System released]; in summary, no answers were provided ** [https://lists.debian.org/debian-derivatives/2012/10/msg00007.html on debian-derivatives Mailing list: Whonix ALPHA 0.4.5 - Anonymous Operating System released]; in summary it was mentioned that if VirtualBox is exploited, it is game over. This is true and already mentioned in the [[Comparison with Others#Attacks|attack matrix]] ----- '''General Discussions'''
October 2012 - Discussions: * [https://www.wilderssecurity.com/showthread.php?p=2122152#post2122152 Wilders Security Forum: Anonymous operating system {{project_name_short}}]; in summary, only questions were asked and no concerns raised * Qubes OS Mailing List: [https://groups.google.com/g/qubes-devel/c/aJGrmlkwO3M qubes vs {{project_name_short}} virtualization solution]; in summary, Qubes OS is deemed safer than VirtualBox. Other than that point, no complaints were raised * Qubes OS Mailing List: [https://groups.google.com/g/qubes-devel/c/aJGrmlkwO3M Whonix: VirtualBox vs Qubes OS]; in summary, it was agreed that Qubes OS is safer than VirtualBox == Audit == {{project_name_short}} has not been subject to a formal audit, but that has little significance. At the time of writing, other privacy/anonymity-focused distributions like TAILS and Liberté Linux have not been audited either. Even major operating systems such as Debian, Ubuntu and Qubes OS have not had public, published audits to date. We are unaware of any serious research concerning the above distributions in [https://www.freehaven.net/anonbib/ Free Haven's Selected Papers in Anonymity]. Further, no experts such as [https://en.wikipedia.org/wiki/Bruce_Schneier Bruce Schneier] for cryptography exist for a security-focused operating system review. Even the usefulness of any published audit must be considered. Audits of software and operating system platforms are necessarily carefully defined and limited in scope due to the size of the undertaking. There are no all-encompassing audits that thoroughly examine or evaluate every possible aspect of security. To explore this issue in further detail, consider the GNU wget computer program that retrieves content from webservers. Has wget ever been audited? Even if it has, what did the audit entail -- a professional company, providing software security audits as a service or some kind of certification? At present no such entities exist to provide this service in the Freedom Software Open Source ecosystem, meaning there are no quality seals for Linux distributions. If the reader is aware of any such examples, please get in contact or edit this section. Also consider whether it is reasonable to expect a reputable organization or individual to make statements like: "GNU wget has been audited and no security vulnerabilities were found". In reality it usually happens the other way around; when someone reviews the source code and finds nothing wrong, nothing is reported. On the other hand, if a vulnerability is found that is worth some fame. In essence, anyone who claims beforehand to have found no security issues does not receive a boost to their reputation, but in fact risks looking bad if problems are discovered later on due to their previous statements about nil security issues. Anybody undertaking an audit of {{project_name_short}} is kindly asked to edit this section or get in contact so the outcome can be linked here. == See Also == * [[Whonix_against_Real_Attacks|{{project_name_short}} Protection against Real World Attacks]] * [[Media Mentions|{{project_name_short}} Media Mentions]] * [[Dev/Leak_Tests|Leak Tests]] * [[Dev/certification|Certification and Audits]] * [[System Audit]] == Footnotes == {{reflist|close=1}} {{Footer}} [[Category:Design]]