Actions

Why does Whonix ™ use Tor?

From Whonix



Whonixusetor.jpg

Whonix ™ uses Tor because it is the best anonymity network available today.

Anonymity Enforcement[edit]

The Whonix ™ Project wants to enforce good security by default for our users. That is why a fundamental Whonix ™ design is to force all outgoing traffic through the Tor anonymity network.

After around 20 years of development [archive], Tor has become a large network with good throughput [archive] and a lot of capacity [archive].

Virtual Private Networks (VPNs) are usually faster than Tor, but they are not anonymity networks. VPN administrators can log both where a user is connecting from and the destination website, breaking anonymity in the process. [1] Tor provides anonymity by design rather than policy, making it impossible for a single point in the network to know both the origin and the destination of a connection. Anonymity by design provides a higher standard, since trust is removed from the equation.

When using a VPN, an adversary can break anonymity by monitoring the incoming and outgoing connections of the limited set of servers. On the other hand, the Tor network is formed by over 6,000 relays and nearly 2,000 bridges [archive] run worldwide by volunteers. [2] This makes it far more difficult to conduct successful, end-to-end correlation (confirmation) attacks, although not impossible.

Poisoned Tor nodes are another concern. If an adversary runs a malicious Tor entry guard and exit node in a network of 7,000 relays (2,000 entry guards and 1,000 exit nodes), the odds of the Tor circuit crossing both are around one in 2 million. If an adversary can increase their malicious entry and exit relays to comprise 10 percent of the bandwidth, they could deanonymize 1 percent of all Tor circuits. [3]

User Base[edit]

Tor has the largest user base of all available anonymity networks. More than 2 million users [archive] connected to Tor daily in 2021. Tor's adoption by a substantial audience proves its maturity, stability, and usability. It has also lead to rapid development and significant community contributions.

Tor is equally used by journalists, law enforcement, governments, human rights activists, business leaders, militaries, abuse victims and average citizens concerned about online privacy. [4] This diversity actually provides stronger anonymity because it makes it more difficult to identify or target a specific profile of Tor user. Anonymity loves company. [5]

Technical Merits and Recognition[edit]

Tor has partnered with leading research institutions and been subject to intensive academic research. It is the anonymity network which benefits from the most auditing and peer review.

Tor has received awards from institutions like the Electronic Frontier Foundation [archive] and the Free Software Foundation [archive] to name a few [archive].

An extract of a Top Secret appraisal by the NSA characterized Tor as "the King of high secure, low latency Internet anonymity [archive]" with "no contenders for the throne in waiting".

Relationship between the Tor Project and Whonix ™[edit]

  • The Tor software is made by The Tor Project [archive].
  • The Tor network is run by a worldwide community of volunteers.
  • Whonix ™ is a completely separate project developed by a different developer team.
  • Whonix ™ is a complete operating system which uses Tor as its default networking application.

Many people use Tor outside of Whonix ™. Similarly, a significant number use Whonix ™ for activities other than accessing the Internet through Tor, for example hosting onion services, tunnelling I2P through Tor, tunnelling VPNs or other anonymity networks through Tor, watching YouTube videos anonymously, and more.

Further Reading[edit]

Footnotes[edit]

License[edit]

Whonix ™ Why does Whonix use Tor wiki page Copyright (C) Amnesia <amnesia at boum dot org>
Whonix ™ Why does Whonix use Tor wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP <adrelanos@whonix.org>

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it under certain conditions; see the wiki source code for details.



Fosshost is sponsors Kicksecure ™ stage server 100px
Fosshost About Advertisements

Search engines: YaCy | Qwant | ecosia | MetaGer | peekier | Whonix ™ Wiki


Follow: 1024px-Telegram 2019 Logo.svg.png Iconfinder Apple Mail 2697658.png Twitter.png Facebook.png Rss.png Reddit.jpg 200px-Mastodon Logotype (Simple).svg.png

Support: Discourse logo.png

Donate: Donate Bank Wire Paypal Bitcoin accepted here Monero accepted here Contribute

Whonix donate bitcoin.png Monero donate Whonix.png United Federation of Planets 1000px.png

Twitter-share-button.png Facebook-share-button.png Telegram-share.png link=mailto:?subject=Why does Whonix use Tor&body=./Why_does_Whonix_use_Tor link=https://reddit.com/submit?url=./Why_does_Whonix_use_Tor&title=Why does Whonix use Tor link=https://news.ycombinator.com/submitlink?u=./Why_does_Whonix_use_Tor&t=Why does Whonix use Tor link=https://mastodon.technology/share?message=Why does Whonix use Tor%20./Why_does_Whonix_use_Tor&t=Why does Whonix use Tor

Twitter-share-button.png Facebook-share-button.png Telegram-share.png link=mailto:?subject=Why does Whonix use Tor&body=./Why_does_Whonix_use_Tor link=https://reddit.com/submit?url=./Why_does_Whonix_use_Tor&title=Why does Whonix use Tor link=https://news.ycombinator.com/submitlink?u=./Why_does_Whonix_use_Tor&t=Why does Whonix use Tor link=https://mastodon.technology/share?message=Why does Whonix use Tor%20./Why_does_Whonix_use_Tor&t=Why does Whonix use Tor

https link onion link Priority Support | Investors | Professional Support

Whonix | © ENCRYPTED SUPPORT LP | Heckert gnu.big.png Freedom Software / Osi standard logo 0.png Open Source (Why?)

The personal opinions of moderators or contributors to the Whonix ™ project do not represent the project as a whole.

By using our website, you acknowledge that you have read, understood and agreed to our Privacy Policy, Cookie Policy, Terms of Service, and E-Sign Consent.