Hacker News new | past | comments | ask | show | jobs | submit login

How? They fail to say, and most of what they do is just promotional garbage.



> How? They fail to say, and most of what they do is just promotional garbage.

On the page that OP linked to, there's statements such as:

"The Everything Tor OS - All traffic is routed through the Tor anonymity network. No exceptions. Whonix is the "All Tor Operating System"."

"Cloaking your typing style - Your typing behavior can be used to identify you. Whonix prevents this with a cloak for your keystrokes."

"Live Mode - Whonix offers a much requested Live Mode. After the session all data will be gone."

So I don't get your point. Of course if you want to know how, in detail, you have to read the documentation.

https://www.whonix.org/wiki/Documentation




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: