Visit Jeremy's Blog.
Go Back > Forums > Linux Forums > Linux - Distributions
User Name
Linux - Distributions This forum is for Distribution specific questions.
Red Hat, Slackware, Debian, Novell, LFS, Mandriva, Ubuntu, Fedora - the list goes on and on... Note: An (*) indicates there is no official participation from that distribution here at LQ.


  Search this Thread
Old 12-30-2015, 08:28 PM   #1
Registered: Mar 2015
Distribution: Arch
Posts: 62

Rep: Reputation: Disabled
Why is it more secure to use Tor on Whonix, then just use tor elsewhere?

Isn't a distro like arch with just tor and iptables more secure because it comes with nothing on it. If I run Whonix I'm seeing myself at the mercy of the developers? if one of them is compromised wouldn't security distros be much more prone to snooping around.

I obviously don't know anything and I'm just curious to learn more.
Old 12-31-2015, 03:48 AM   #2
Registered: Aug 2009
Location: Umzinto, South Africa
Distribution: Crunchbangified Debian 8 (Jessie)
Posts: 747
Blog Entries: 1

Rep: Reputation: 172Reputation: 172
Being "at the mercy of developers" is pretty much true for any distribution. Whonix is, however, open source. It is also Debian, so any security issues for Debian could also affect Whonix.

The advantage of a distribution like Whonix is that a lot of people, who collectively know a lot more about security than any one person, are all working together to make it easier for the average joe to enjoy the benefits of Tor.

Tor is just a tool, and if it's mis-configured or simply just used the wrong way it is really no more anonymous than any other option.

Regardless of which distro you use Tor with, you need to read up and educate yourself as much as possible about online safety and security.

You are your own best, and worst, security app.
Old 12-31-2015, 05:53 AM   #3
LQ Addict
Registered: Dec 2013
Posts: 16,920
Blog Entries: 10

Rep: Reputation: 5039Reputation: 5039Reputation: 5039Reputation: 5039Reputation: 5039Reputation: 5039Reputation: 5039Reputation: 5039Reputation: 5039Reputation: 5039Reputation: 5039
it is true for closed source software, that you are "at the mercy" of the devs.

it is the very definition of open source software, that you are not "at the mercy" of the devs.
because its source is open for everyone to see.

but just for the sake of argument, you are still "at the mercy" of arch developers, and tor developers.
and there's many levels of software in between - systemd, gtk, Xorg... that you need to install before you can install tor on top of arch.

but, in the end i agree with your sentiment: it is safer to do it yourself.


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off

Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: Tor Browser 4.5.2 Is Out with the Latest Tor Anonymity Network Software LXer Syndicated Linux News 0 06-17-2015 02:40 PM
LXer: Tor exit nodes face unusual activity, is Tor being raided or under hack attack? LXer Syndicated Linux News 0 12-23-2014 12:03 AM
LXer: How To Set Up A TOR Middlebox Routing All VirtualBox Virtual Machine Traffic Over The TOR Netw LXer Syndicated Linux News 0 02-08-2012 11:30 AM
LXer: Tor Browser Bundle-Tor Goes Portable LXer Syndicated Linux News 1 09-02-2011 02:29 AM
TOR: traffic between my workstation TOR entry point really not encrypted..? john99 Incognito 3 11-11-2009 01:06 AM > Forums > Linux Forums > Linux - Distributions

All times are GMT -5. The time now is 06:33 AM.

Main Menu
Write for LQ is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration