Giter Club home page Giter Club logo

hiddenvm's Introduction

     

PLEASE NOTE: If at any time Tails pushes an unexpected update, and HiddenVM is not yet updated for it, and you are stuck with a new Tails and no working HiddenVM version, you can re-download and temporarily use an earlier version of Tails until HiddenVM is updated. There are archived direct HTTP download mirrors of Tails images, archived official torrents with PGP signatures, or third party archives at linuxtracker.org or fosstorrents.com etc. (Always verify third party torrents with archived official PGP sigs for safety.) Unless there is a known security vulnerability patched by the new Tails which actually affects how you use Tails, doing a temporary downgrade is not unsafe. You aren't necessarily unsafe by using older-than-one-month-old Tails software for a short time. Thank you for your patience, and stay safe.

HiddenVM is an innovation in computing privacy.

Imagine you're entering a country at the airport. The border agents seize your laptop and force you to unlock it so that they can violate your privacy, treat you like a criminal, and insult your humanity. Is that the world you want to live in?

Whether you use Windows, macOS or Linux, now there's a tech solution for better privacy: HiddenVM.

HiddenVM is a simple, one-click, free and open-source Linux application that allows you to run Oracle's open-source VirtualBox software on the Tails operating system.

This means you can run almost any OS as a VM inside the most anti-forensic computing environment in the world. Works where Tails does.

The VM will even connect to full-speed pre-Tor Internet by default, while leaving the Tor connection in Tails undisturbed.

To ensure anti-forensic deniability of your VMs, you can place your persistent HiddenVM installation - containing all VirtualBox binaries, VMs, and HiddenVM itself - in a hidden VeraCrypt volume, and only mount it in the amnesic Tails.

If you set it up correctly, when your computer is turned off all anyone can plausibly see is a blank Tails USB and a 'wiped' hard drive full of meaningless data, or a default booting decoy OS in a partition that you can create.

How does it feel to have no trace of your entire operating system - whether it's Windows, macOS or Linux - ever touch your hard drive? Now you can find out.

HiddenVM: insanely private!

Before you install:

  • Always have two Tails USB sticks, with one as a backup of the latest working Tails for your current HiddenVM.
  • Always upgrade Tails on your second stick, in case the new Tails doesn't work with your current HiddenVM.
  • Always give us time to troubleshoot and fix our code to make it work with a new Tails version. Thank you for your patience.
  • This will give you stability and prevent you from being locked out of your HiddenVM at any point due to a Tails upgrade.

Install:

  • Boot into Tails on your computer and set an admin password for your session.
  • Do NOT use Tails' persistent volume feature.
  • Create and mount a deniable, secure storage environment on internal or external media such as a VeraCrypt volume.
  • Download our latest release ZIP and extract the archive.
  • Run our AppImage file in the Files browser.
  • Choose to store HiddenVM in your secure storage and it will download all binaries to launch VirtualBox.

Usage:

  • After initially installing HiddenVM you can use it offline where each VirtualBox launch takes about 2 minutes.

You don't have to. Inspect the AppImage code:

  • Open a Terminal and cd to the folder containing our AppImage.
  • Run mkdir inspect && sudo mount HiddenVM-*-x86_64.AppImage inspect -o offset=188456
  • Every file in the mounted folder can be inspected with a text editor. To search for IP addresses or web domains that HiddenVM could try to phone home to and violate your privacy, use Searchmonkey (sudo apt install searchmonkey) to recursively search for \.\S in the mounted folder's files.
  • Once you trust the current version of HiddenVM, when new releases arrive you can track code changes by using Meld (sudo apt install meld). Drag and drop the old and new folders together into Meld, and any code differences will be highlighted.

Also you can check the integrity of our ZIP release file:

  • Download both our ZIP and the SHA512.
  • Extract our AppImage and place it next to the SHA512.
  • Do sha512sum -c HiddenVM-*-x86_64.sha512 and it will check both the ZIP and the AppImage.

Or generate your own AppImage from our source code once you trust it:

  1. git clone https://github.com/aforensics/HiddenVM.git
  2. cd HiddenVM/appimage
  3. ./make-appimage.sh (The script will download appimagetool from AppImageKit if it needs to.)

See your own generated AppImage in the target subdir.

In the same way as Tor and Tails, HiddenVM (called HVM for short) is intended for a wide range of people and situations around the world. In our digital age of increasing surveillance and control, we need tools to keep digital privacy and freedom alive.

If you are a political dissident in a country under totalitarian rule, in your situation there has never been a robust tech solution to truly hide and protect your data in a convenient way. Our tool may provide that for you.

We are aligned with the Tails and Tor projects in our intention and promotion of how this software could and should be used.

We have so far successfully tested Windows 10, macOS Mojave, Linux Mint, Ubuntu, Xubuntu, Fedora, and Whonix. Anything that works in VirtualBox should be compatible. Our Wiki will have how-to's and links for specific OSes. Please contribute interesting findings in our subreddit.

Using VMs in Tails uses a lot of RAM because Tails already runs entirely in RAM. We recommended at least 16 GB in your machine but your mileage may vary.

The first time you run HiddenVM, the install can take anywhere from several minutes to more than half an hour because it needs to download all the necessary software that it uses. After that it caches everything offline for a much quicker 2-minute launch time.

Every 7 days, if you're connected to the Internet HiddenVM will do an apt-get update to check repositories like VirtualBox and will download new updates if available. Sometimes you can get connected to a very slow Tor circuit in Tails. Close off HiddenVM's Terminal window and restart Tails to hopefully be connected to a faster circuit.

Every time you do a Tails and HiddenVM upgrade, the first time after this will almost always need to install new package versions, thus taking around 5 minutes or longer. Then it returns to the usual 2 minutes.

See here. It's the current Tor circuit failing. Simply close off HiddenVM and try again, or try other options in the linked issue.

Yes. It may even be possible to use HVM offline for extended periods of several months at a time if you never update Tails or HiddenVM during such periods.

We can't guarantee this, but limited testing by the team has confirmed it being possible for at least a month.

As soon as you connect to the Internet, HiddenVM may upgrade its cached software and you may have to upgrade to the latest version from our GitHub as well as your Tails, but after all software is updated and verified as in sync by HiddenVM, it could be possible to use it offline for an extended period again.

  • Currently, during HiddenVM's launch process doing certain tasks in Tails can crash your live session. It's not a serious limitation e.g. using Tails' Tor Browser does not cause the crash. The issue is caused by our complicated process of installing VirtualBox in Tails which temporarily upgrades and then restores the original versions of dependencies used by certain GNOME apps. When HiddenVM finishes its launch you can resume all activity in Tails again. We hope we can remove this limitation in a future HiddenVM redesign.

HiddenVM allows you to fully automate the customization of your Tails environment at every launch by performing system settings modifications or loading additional software including persistent config files for such software.

Go to 'extras' folder in your HiddenVM and rename extras-example.sh to extras.sh. Any lines you add will be performed as bash script code at the end of each subsequent HiddenVM launch, right after it opens VirtualBox.

Some examples:

sudo apt-get install autokey-gtk -y #Install a popular Linux universal hotkeys tool
nohup autokey & #Launch the Linux universal hotkeys tool that Extras just installed
gsettings set org.gnome.desktop.interface enable-animations false #Turn off GNOME animations

Eventually we will have a Wiki page with many Extras examples. Please contribute ideas. The installation and launching of a pre-VirtualBox VPN could be possible.

Warning: Make sure your commands work or it can cause HiddenVM to produce errors or not fully exit its Terminal.

Dotfiles: Inside 'extras' is the 'dotfiles' folder. Place any files or folder structures in there and HiddenVM will recursively symlink them into your Tails session's Home folder at /home/amnesia. This is a very powerful feature. By putting a .config folder structure in there you can have all your additional software settings pre-loaded before they're installed via Extras.

Tails' Additional Software feature disturbs HiddenVM's complicated apt-get update wizardry that achieves our VirtualBox-installing breakthrough.

More importantly, our intention is for HVM's virtual machines to be truly 'hidden', i.e. forensically undetectable. This is the first time you can emulate VeraCrypt's Windows Hidden OS feature, but this time the plausible deniability hasn't been broken by security researchers and it's for any OS you want.

Due to using LUKS encryption, Tails' persistent volume feature currently offers no anti-forensics for the data in that area of your Tails stick, and is therefore not airport border inspection proof. If that ever changes, we would prefer to integrate HiddenVM more elegantly into Tails' existing infrastructure, and we appreciate the wonderful work the Tails devs do.

Yes. To permanently add it, edit the env file in your HiddenVM folder and change the INSTALL_EXT_PACK= line from "false" to "true". Then quit VirtualBox if it's open and execute the AppImage once more.

In order to run macOS in VirtualBox, you need to use the Extension Pack.

No, and this is actually a bonus. By having normal full-speed Internet in any VM as the default, you can pretend it's a normal computer on your network but actually it's protected inside the anti-forensic environment of Tails.

You can still Torify a VM by simply linking it to a Whonix-Gateway VM. You can have the best of both worlds. But be careful, don't use a VM with clearnet Internet and then later with Torification, or vice versa, if anonymity is a concern.

Due to HiddenVM's design, fortunately no. Because it connects to pre-Tor 'clearnet' Internet by default, Whonix-Gateway will connect independently of Tails' own Tor process, making both able to co-exist in the one environment.

HiddenVM's clearnet Internet doesn't pass on DNS resolution by default. To get normal full Internet working in a non-Torified VM, manually set DNS servers in its system network settings to anything like Cloudflare's 1.1.1.1 and 1.0.0.1. We might be able to fix this problem in the future.

Note: This is not an issue for Whonix-Gateway which resolve hostnames via its own Tor process inside the VM. Whonix-Workstation then points to Gateway for its DNS, as will any other Gateway-Torified VMs.

We do change a few security settings in the Tails Debian system in order to make HiddenVM do its thing. Apart from the fact that you can inspect our code, we'll add to our Wiki the list of exactly what HiddenVM temporarily modifies in your Tails environment from a security standpoint, so that you can know exactly what's going on.

E.g. HiddenVM hooks into Tails' 'clearnet' user infrastructure, which some people are already concerned about existing in Tails.

We also increase the sudo timeout to improve the user experience to only require password authentication one time. This is because HiddenVM can sometimes take a while to do its thing when initially installing or during weekly updates. This timeout is not normally extended in Tails' Debian environment and it may give elevated privileges to malware you could accidentally download in your main Tails environment.

In the end, the thing that controls your safely more than anything else is what you do or download in Tails. We and the Tails project can only help you so much.

As a result, we strongly suggest minimal usage of outer Tails Internet activity when using HVM. Tails' attack surface is already wide and HVM makes that a little wider. To do significant Tor Browser or other Internet-connected activity in Tails outside of HiddenVM, boot into a new Tails session and don't launch HiddenVM.

No, HiddenVM is just an innovative and unexpected use of Tails that people didn't think was possible.

Our project actually pays a high compliment to Tails. We're promoting Tails as an entire platform and ecosystem for aforensic computing, which expands the vision of its benefits for the world. We trust and humbly rely on Tails, Tor, Debian and Linux as upstream projects and we feel an extreme sense of responsibility with what we're doing.

We take user privacy, security, and anonymity very seriously and will implement updates to improve the default safety for HiddenVM users over time. For now, we invite you to inspect our code and offer suggestions and contributions that improve security without removing functionality or features.

Furthermore, HiddenVM could attract new users to the Tails user base, which would increase its anonymity set, which is beneficial for the Tails community.

Although we don't use Tails' Tor for our main Tor computing and we prefer HVM Whonix instead, we are still promoting and making use of Tails' Tor as a fundamental part of downloading and setting up HiddenVM. Due to Tails being amnesic and connecting to the Tor network by default, it's an incredibly safe environment to set up a computer using HiddenVM, and we are promoting this.

As such, we are normal Tails users and advocates ourselves.

Your data is not 'private' or 'hidden' during your use of your computer with your VeraCrypt volume unlocked. The privacy only applies to when your computer is turned off, or turned on but with the private data in your VeraCrypt volume not unlocked after turning it on.

'Deniability' is very complex. There are many threat models and situations. There is no one-size-fits-all method of effective deniability. How 'normal' or 'plausible' your computer or data must convincingly appear to be, when turned off or forced to be turned on, entirely depends on your circumstances and who your 'enemy' is.

Our claim of effective deniability is a very broad one and might not apply to your particular scenario. We might not be able to cater to your scenario but we are very interested in studying it and our Wiki could become a place to document various scenarios and solutions for deniability in the context of HiddenVM.

The Tails project lists other limitations and warnings which may apply. Please read them.

Despite our grand words earlier in this README, any software project claiming increased security, privacy or anonymity can never provide a guarantee for such things, and we are no different here.

As our license states, we are not liable to you for any damages as a result of using our software. Similarly, any claims by our project or its representatives are personal opinions and do not constitute legal advice or digital security advice.

The HiddenVM project provides no guarantee of any security, privacy or anonymity as a result of you using our software. You use our software at your own risk, and if or how you use it is your own discretion.

hiddenvm's People

Contributors

aforensics avatar animik avatar gerbrent avatar oako-uconn avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

hiddenvm's Issues

Installation always times out w/ 1.40 version

I'm at a loss. Installation of HiddenVM v1.40 never completes. Tried multiple networks, wired, wireless, VPN, etc. Two different PCs. Different days. Never had this issue with prior versions. Running bootstrap.sh always ends with "Connection timed out"

running sudo apt-get update on tails prior does not change the result
HiddenVM.log

Cant launch VirtualBox after executing the AppImage

Hello, first of all thank you and the whole team very much for your work on HiddenVM.
For some reason I cant launch VirtualBox, after executing the AppImage and installing it onto the encrypted hidden partition made using VeraCrypt. I instantly get the message, that VirtualBox shut itself down. Restarting it dosent help either. Did a couple fresh installations of tails and waited for several updates for both Tails and HiddenVM but that didnt help either. So I guess the problem is somewhere on my side. I wasnt able to find anything in the logs to help me out either.
Thanks for any advice you can give me.

clearnet-vbox.log 2021-04-28 01:00:08+00:00 [HiddenVM] [clearnet-vbox.sh] HiddenVM v1.13 2021-04-28 01:00:08+00:00 [HiddenVM] [clearnet-vbox.sh] Mount /home/clearnet/HiddenVM 2021-04-28 01:00:08+00:00 [HiddenVM] [clearnet-vbox.sh] Launch VirtualBox as the clearnet user localuser:clearnet being added to access control list Qt WARNING: QStandardPaths: XDG_RUNTIME_DIR not set, defaulting to '/tmp/runtime-clearnet' Qt WARNING: The X11 connection broke: Maximum allowed requested length exceeded (code 4) XIO: fatal IO error 2 (No such file or directory) on X server ":1" after 614 requests (614 known processed) with 0 events remaining. localuser:clearnet being removed from access control list 2021-04-28 01:00:09+00:00 [HiddenVM] [clearnet-vbox.sh] Completing tear down TARGET SOURCE FSTYPE OPTIONS /home/clearnet/HiddenVM /media/amnesia/2fc8ccaf-8389-4878-b780-eafe98a35190/HiddenVM1/HiddenVM fuse rw,nosuid,nodev,relatime,user_id=1000,group_id=1000,default_permissions,allow_other 2021-04-28 01:00:10+00:00 [HiddenVM] [clearnet-vbox.sh] Lazily unmount /home/clearnet/HiddenVM
: HiddenVM.Log �]0;HiddenVM v1.13� 2021-04-28 00:47:31+00:00 [HiddenVM] [bootstrap.sh] Begin installation of HiddenVM v1.13, prog-id=1

+-----------------------------------------------------------------------+
| This software is not affiliated with the Tails or VirtualBox projects |
+-----------------------------------------------------------------------+

2021-04-28 00:47:31+00:00 [HiddenVM] [bootstrap.sh] Copy files to /home/amnesia/.clearnet-vbox, prog-id=2
[sudo] password for amnesia: 2021-04-28 00:47:37+00:00 [HiddenVM] [bootstrap.sh] Set up permissions on amnesia mounts, prog-id=3
2021-04-28 00:47:37+00:00 [HiddenVM] [bootstrap.sh] Process configuration, prog-id=4
2021-04-28 00:56:12+00:00 [HiddenVM] [bootstrap.sh] Configure system, prog-id=5
2021-04-28 00:56:13+00:00 [HiddenVM] [bootstrap.sh] No cached apt packages found in /media/amnesia/2fc8ccaf-8389-4878-b780-eafe98a35190/HiddenVM1/HiddenVM/cache/var-cache
2021-04-28 00:56:13+00:00 [HiddenVM] [bootstrap.sh] Did not find previously cached Tails version - will not use apt caches
2021-04-28 00:56:13+00:00 [HiddenVM] [bootstrap.sh] Run 'apt-get update' for linux-headers and vbox, prog-id=7
Get:1 tor+https://download.virtualbox.org/virtualbox/debian buster InRelease [7,736 B]
Ign:1 tor+https://download.virtualbox.org/virtualbox/debian buster InRelease
Get:2 tor+https://snapshot.debian.org/archive/debian/20210212T095132Z buster InRelease [122 kB]
Get:3 tor+https://download.virtualbox.org/virtualbox/debian buster/contrib amd64 Packages [1,761 B]
Get:4 tor+https://snapshot.debian.org/archive/debian/20210212T095132Z buster-backports InRelease [46.7 kB]
Get:5 tor+https://snapshot.debian.org/archive/debian/20210212T095132Z buster/main amd64 Packages [7,907 kB]
Get:6 tor+https://snapshot.debian.org/archive/debian/20210212T095132Z buster/main Translation-en [5,969 kB]
Get:7 tor+https://snapshot.debian.org/archive/debian/20210212T095132Z buster/contrib amd64 Packages [50.1 kB]
Get:8 tor+https://snapshot.debian.org/archive/debian/20210212T095132Z buster/contrib Translation-en [44.2 kB]
Get:9 tor+https://snapshot.debian.org/archive/debian/20210212T095132Z buster-backports/main amd64 Packages [446 kB]
Get:10 tor+https://snapshot.debian.org/archive/debian/20210212T095132Z buster-backports/main Translation-en [375 kB]
Get:11 tor+https://snapshot.debian.org/archive/debian/20210212T095132Z buster-backports/contrib amd64 Packages [8,784 B]
Get:12 tor+https://snapshot.debian.org/archive/debian/20210212T095132Z buster-backports/contrib Translation-en [7,800 B]
Fetched 15.0 MB in 17s (865 kB/s)
Reading package lists...
W: GPG error: tor+https://download.virtualbox.org/virtualbox/debian buster InRelease: The following signatures couldn't be verified because the public key is not available: NO_PUBKEY A2F683C52980AECF
2021-04-28 00:56:30+00:00 [HiddenVM] [bootstrap.sh] Timestamp recorded for 'apt-get update' to /media/amnesia/2fc8ccaf-8389-4878-b780-eafe98a35190/HiddenVM1/HiddenVM/cache/last-apt-update-for-vbox
2021-04-28 00:56:30+00:00 [HiddenVM] [bootstrap.sh] Back up apt lists to /media/amnesia/2fc8ccaf-8389-4878-b780-eafe98a35190/HiddenVM1/HiddenVM/cache/var-lib-apt-for-vbox
2021-04-28 00:56:31+00:00 [HiddenVM] [bootstrap.sh] Install packages, prog-id=9
Reading package lists...
Building dependency tree...
Reading state information...
The following package was automatically installed and is no longer required:
libpcre2-posix0
Use 'sudo apt autoremove' to remove it.
The following additional packages will be installed:
binutils binutils-common binutils-x86-64-linux-gnu libbinutils
Suggested packages:
binutils-doc debian-keyring make-doc
Recommended packages:
build-essential gcc | c-compiler fakeroot libalgorithm-merge-perl
The following NEW packages will be installed:
bindfs binutils binutils-common binutils-x86-64-linux-gnu dpkg-dev
libbinutils make
0 upgraded, 7 newly installed, 0 to remove and 37 not upgraded.
Need to get 6,579 kB of archives.
After this operation, 31.8 MB of additional disk space will be used.
Get:1 tor+https://snapshot.debian.org/archive/debian/20210212T095132Z buster/main amd64 bindfs amd64 1.13.10-1 [33.6 kB]
Get:2 tor+https://snapshot.debian.org/archive/debian/20210212T095132Z buster/main amd64 binutils-common amd64 2.31.1-16 [2,073 kB]
Get:3 tor+https://snapshot.debian.org/archive/debian/20210212T095132Z buster/main amd64 libbinutils amd64 2.31.1-16 [478 kB]
Get:4 tor+https://snapshot.debian.org/archive/debian/20210212T095132Z buster/main amd64 binutils-x86-64-linux-gnu amd64 2.31.1-16 [1,823 kB]
Get:5 tor+https://snapshot.debian.org/archive/debian/20210212T095132Z buster/main amd64 binutils amd64 2.31.1-16 [56.8 kB]
Get:6 tor+https://snapshot.debian.org/archive/debian/20210212T095132Z buster/main amd64 make amd64 4.2.1-1.2 [341 kB]
Get:7 tor+https://snapshot.debian.org/archive/debian/20210212T095132Z buster/main amd64 dpkg-dev all 1.19.7 [1,773 kB]
Fetched 6,579 kB in 9s (751 kB/s)
Selecting previously unselected package bindfs.
(Reading database ...
(Reading database ... 5%
(Reading database ... 10%
(Reading database ... 15%
(Reading database ... 20%
(Reading database ... 25%
(Reading database ... 30%
(Reading database ... 35%
(Reading database ... 40%
(Reading database ... 45%
(Reading database ... 50%
(Reading database ... 55%
(Reading database ... 60%
(Reading database ... 65%
(Reading database ... 70%
(Reading database ... 75%
(Reading database ... 80%
(Reading database ... 85%
(Reading database ... 90%
(Reading database ... 95%
(Reading database ... 100%
(Reading database ... 130446 files and directories currently installed.)
Preparing to unpack .../0-bindfs_1.13.10-1_amd64.deb ...
Unpacking bindfs (1.13.10-1) ...
Selecting previously unselected package binutils-common:amd64.
Preparing to unpack .../1-binutils-common_2.31.1-16_amd64.deb ...
Unpacking binutils-common:amd64 (2.31.1-16) ...
Selecting previously unselected package libbinutils:amd64.
Preparing to unpack .../2-libbinutils_2.31.1-16_amd64.deb ...
Unpacking libbinutils:amd64 (2.31.1-16) ...
Selecting previously unselected package binutils-x86-64-linux-gnu.
Preparing to unpack .../3-binutils-x86-64-linux-gnu_2.31.1-16_amd64.deb ...
Unpacking binutils-x86-64-linux-gnu (2.31.1-16) ...
Selecting previously unselected package binutils.
Preparing to unpack .../4-binutils_2.31.1-16_amd64.deb ...
Unpacking binutils (2.31.1-16) ...
Selecting previously unselected package make.
Preparing to unpack .../5-make_4.2.1-1.2_amd64.deb ...
Unpacking make (4.2.1-1.2) ...
Selecting previously unselected package dpkg-dev.
Preparing to unpack .../6-dpkg-dev_1.19.7_all.deb ...
Unpacking dpkg-dev (1.19.7) ...
Setting up bindfs (1.13.10-1) ...
Setting up binutils-common:amd64 (2.31.1-16) ...
Setting up make (4.2.1-1.2) ...
Setting up libbinutils:amd64 (2.31.1-16) ...
Setting up binutils-x86-64-linux-gnu (2.31.1-16) ...
Setting up binutils (2.31.1-16) ...
Setting up dpkg-dev (1.19.7) ...
Processing triggers for man-db (2.8.5-2) ...
Processing triggers for libc-bin (2.28-10) ...
2021-04-28 00:57:36+00:00 [HiddenVM] [bootstrap.sh] Installing linux-headers-5.10.0-0.bpo.3-amd64 from 'buster-backports', prog-id=10
Reading package lists...
Building dependency tree...
Reading state information...
The following package was automatically installed and is no longer required:
libpcre2-posix0
Use 'sudo apt autoremove' to remove it.
The following additional packages will be installed:
gcc-8 libasan5 libcc1-0 libgcc-8-dev libitm1 liblsan0 libmpx2 libtsan0
libubsan1 linux-compiler-gcc-8-x86 linux-headers-5.10.0-0.bpo.3-common
linux-kbuild-5.10
Suggested packages:
gcc-8-multilib gcc-8-doc gcc-8-locales libgcc1-dbg libgomp1-dbg libitm1-dbg
libatomic1-dbg libasan5-dbg liblsan0-dbg libtsan0-dbg libubsan1-dbg
libmpx2-dbg libquadmath0-dbg
Recommended packages:
libc6-dev
The following NEW packages will be installed:
gcc-8 libasan5 libcc1-0 libgcc-8-dev libitm1 liblsan0 libmpx2 libtsan0
libubsan1 linux-compiler-gcc-8-x86 linux-headers-5.10.0-0.bpo.3-amd64
linux-headers-5.10.0-0.bpo.3-common linux-kbuild-5.10
0 upgraded, 13 newly installed, 0 to remove and 137 not upgraded.
Need to get 23.0 MB of archives.
After this operation, 106 MB of additional disk space will be used.
Get:1 tor+https://snapshot.debian.org/archive/debian/20210212T095132Z buster/main amd64 libcc1-0 amd64 8.3.0-6 [46.6 kB]
Get:2 tor+https://snapshot.debian.org/archive/debian/20210212T095132Z buster/main amd64 libitm1 amd64 8.3.0-6 [27.7 kB]
Get:3 tor+https://snapshot.debian.org/archive/debian/20210212T095132Z buster/main amd64 libasan5 amd64 8.3.0-6 [362 kB]
Get:4 tor+https://snapshot.debian.org/archive/debian/20210212T095132Z buster/main amd64 liblsan0 amd64 8.3.0-6 [131 kB]
Get:5 tor+https://snapshot.debian.org/archive/debian/20210212T095132Z buster/main amd64 libtsan0 amd64 8.3.0-6 [283 kB]
Get:6 tor+https://snapshot.debian.org/archive/debian/20210212T095132Z buster/main amd64 libubsan1 amd64 8.3.0-6 [120 kB]
Get:7 tor+https://snapshot.debian.org/archive/debian/20210212T095132Z buster/main amd64 libmpx2 amd64 8.3.0-6 [11.4 kB]
Get:8 tor+https://snapshot.debian.org/archive/debian/20210212T095132Z buster/main amd64 libgcc-8-dev amd64 8.3.0-6 [2,298 kB]
Get:9 tor+https://snapshot.debian.org/archive/debian/20210212T095132Z buster/main amd64 gcc-8 amd64 8.3.0-6 [9,452 kB]
Get:10 tor+https://snapshot.debian.org/archive/debian/20210212T095132Z buster-backports/main amd64 linux-compiler-gcc-8-x86 amd64 5.10.13-1bpo10+1 [254 kB]
Get:11 tor+https://snapshot.debian.org/archive/debian/20210212T095132Z buster-backports/main amd64 linux-headers-5.10.0-0.bpo.3-common all 5.10.13-1
bpo10+1 [8,745 kB]
Get:12 tor+https://snapshot.debian.org/archive/debian/20210212T095132Z buster-backports/main amd64 linux-kbuild-5.10 amd64 5.10.13-1bpo10+1 [495 kB]
Get:13 tor+https://snapshot.debian.org/archive/debian/20210212T095132Z buster-backports/main amd64 linux-headers-5.10.0-0.bpo.3-amd64 amd64 5.10.13-1
bpo10+1 [781 kB]
Fetched 23.0 MB in 24s (958 kB/s)
Selecting previously unselected package libcc1-0:amd64.
(Reading database ...
(Reading database ... 5%
(Reading database ... 10%
(Reading database ... 15%
(Reading database ... 20%
(Reading database ... 25%
(Reading database ... 30%
(Reading database ... 35%
(Reading database ... 40%
(Reading database ... 45%
(Reading database ... 50%
(Reading database ... 55%
(Reading database ... 60%
(Reading database ... 65%
(Reading database ... 70%
(Reading database ... 75%
(Reading database ... 80%
(Reading database ... 85%
(Reading database ... 90%
(Reading database ... 95%
(Reading database ... 100%
(Reading database ... 131107 files and directories currently installed.)
Preparing to unpack .../00-libcc1-0_8.3.0-6_amd64.deb ...
Unpacking libcc1-0:amd64 (8.3.0-6) ...
Selecting previously unselected package libitm1:amd64.
Preparing to unpack .../01-libitm1_8.3.0-6_amd64.deb ...
Unpacking libitm1:amd64 (8.3.0-6) ...
Selecting previously unselected package libasan5:amd64.
Preparing to unpack .../02-libasan5_8.3.0-6_amd64.deb ...
Unpacking libasan5:amd64 (8.3.0-6) ...
Selecting previously unselected package liblsan0:amd64.
Preparing to unpack .../03-liblsan0_8.3.0-6_amd64.deb ...
Unpacking liblsan0:amd64 (8.3.0-6) ...
Selecting previously unselected package libtsan0:amd64.
Preparing to unpack .../04-libtsan0_8.3.0-6_amd64.deb ...
Unpacking libtsan0:amd64 (8.3.0-6) ...
Selecting previously unselected package libubsan1:amd64.
Preparing to unpack .../05-libubsan1_8.3.0-6_amd64.deb ...
Unpacking libubsan1:amd64 (8.3.0-6) ...
Selecting previously unselected package libmpx2:amd64.
Preparing to unpack .../06-libmpx2_8.3.0-6_amd64.deb ...
Unpacking libmpx2:amd64 (8.3.0-6) ...
Selecting previously unselected package libgcc-8-dev:amd64.
Preparing to unpack .../07-libgcc-8-dev_8.3.0-6_amd64.deb ...
Unpacking libgcc-8-dev:amd64 (8.3.0-6) ...
Selecting previously unselected package gcc-8.
Preparing to unpack .../08-gcc-8_8.3.0-6_amd64.deb ...
Unpacking gcc-8 (8.3.0-6) ...
Selecting previously unselected package linux-compiler-gcc-8-x86.
Preparing to unpack .../09-linux-compiler-gcc-8-x86_5.10.13-1bpo10+1_amd64.deb ...
Unpacking linux-compiler-gcc-8-x86 (5.10.13-1
bpo10+1) ...
Selecting previously unselected package linux-headers-5.10.0-0.bpo.3-common.
Preparing to unpack .../10-linux-headers-5.10.0-0.bpo.3-common_5.10.13-1bpo10+1_all.deb ...
Unpacking linux-headers-5.10.0-0.bpo.3-common (5.10.13-1
bpo10+1) ...
Selecting previously unselected package linux-kbuild-5.10.
Preparing to unpack .../11-linux-kbuild-5.10_5.10.13-1bpo10+1_amd64.deb ...
Unpacking linux-kbuild-5.10 (5.10.13-1
bpo10+1) ...
Selecting previously unselected package linux-headers-5.10.0-0.bpo.3-amd64.
Preparing to unpack .../12-linux-headers-5.10.0-0.bpo.3-amd64_5.10.13-1bpo10+1_amd64.deb ...
Unpacking linux-headers-5.10.0-0.bpo.3-amd64 (5.10.13-1
bpo10+1) ...
Setting up linux-headers-5.10.0-0.bpo.3-common (5.10.13-1bpo10+1) ...
Setting up libasan5:amd64 (8.3.0-6) ...
Setting up libmpx2:amd64 (8.3.0-6) ...
Setting up libubsan1:amd64 (8.3.0-6) ...
Setting up linux-kbuild-5.10 (5.10.13-1
bpo10+1) ...
Setting up libcc1-0:amd64 (8.3.0-6) ...
Setting up liblsan0:amd64 (8.3.0-6) ...
Setting up libitm1:amd64 (8.3.0-6) ...
Setting up libtsan0:amd64 (8.3.0-6) ...
Setting up libgcc-8-dev:amd64 (8.3.0-6) ...
Setting up gcc-8 (8.3.0-6) ...
Setting up linux-compiler-gcc-8-x86 (5.10.13-1bpo10+1) ...
Setting up linux-headers-5.10.0-0.bpo.3-amd64 (5.10.13-1
bpo10+1) ...
Processing triggers for libc-bin (2.28-10) ...
Processing triggers for man-db (2.8.5-2) ...
2021-04-28 00:58:04+00:00 [HiddenVM] [bootstrap.sh] Install VirtualBox, prog-id=11
Reading package lists...
Building dependency tree...
Reading state information...
The following package was automatically installed and is no longer required:
libpcre2-posix0
Use 'sudo apt autoremove' to remove it.
The following additional packages will be installed:
libqt5opengl5
Recommended packages:
libsdl-ttf2.0-0 linux-headers-generic | linux-headers-generic-pae
| linux-headers-686-pae | linux-headers-amd64 | linux-headers-2.6-686
| linux-headers-2.6-amd64 | linux-headers linux-image gcc
The following NEW packages will be installed:
libqt5opengl5 virtualbox-6.1
0 upgraded, 2 newly installed, 0 to remove and 37 not upgraded.
Need to get 88.2 MB of archives.
After this operation, 214 MB of additional disk space will be used.
Get:1 tor+https://snapshot.debian.org/archive/debian/20210212T095132Z buster/main amd64 libqt5opengl5 amd64 5.11.3+dfsg1-1+deb10u4 [161 kB]
Get:2 tor+https://download.virtualbox.org/virtualbox/debian buster/contrib amd64 virtualbox-6.1 amd64 6.1.20-143896Debianbuster [88.1 MB]
Preconfiguring packages ...
Fetched 88.2 MB in 1min 35s (931 kB/s)
Selecting previously unselected package libqt5opengl5:amd64.
(Reading database ...
(Reading database ... 5%
(Reading database ... 10%
(Reading database ... 15%
(Reading database ... 20%
(Reading database ... 25%
(Reading database ... 30%
(Reading database ... 35%
(Reading database ... 40%
(Reading database ... 45%
(Reading database ... 50%
(Reading database ... 55%
(Reading database ... 60%
(Reading database ... 65%
(Reading database ... 70%
(Reading database ... 75%
(Reading database ... 80%
(Reading database ... 85%
(Reading database ... 90%
(Reading database ... 95%
(Reading database ... 100%
(Reading database ... 149897 files and directories currently installed.)
Preparing to unpack .../libqt5opengl5_5.11.3+dfsg1-1+deb10u4_amd64.deb ...
Unpacking libqt5opengl5:amd64 (5.11.3+dfsg1-1+deb10u4) ...
Selecting previously unselected package virtualbox-6.1.
Preparing to unpack .../virtualbox-6.1_6.1.20-143896Debianbuster_amd64.deb ...
Unpacking virtualbox-6.1 (6.1.20-143896Debianbuster) ...
Setting up libqt5opengl5:amd64 (5.11.3+dfsg1-1+deb10u4) ...
Setting up virtualbox-6.1 (6.1.20-143896Debianbuster) ...
Adding group `vboxusers' (GID 129) ...
Done.
Processing triggers for mime-support (3.62) ...
Processing triggers for hicolor-icon-theme (0.17-2) ...
Processing triggers for gnome-menus (3.31.4-3) ...
Processing triggers for libc-bin (2.28-10) ...
Processing triggers for systemd (241-7~deb10u7) ...
Processing triggers for shared-mime-info (1.10-1) ...
Processing triggers for desktop-file-utils (0.23-4.0tails1) ...
2021-04-28 01:00:05+00:00 [HiddenVM] [bootstrap.sh] No record found for the last time the package cache was pruned (/media/amnesia/2fc8ccaf-8389-4878-b780-eafe98a35190/HiddenVM1/HiddenVM/cache/last-pkg-cache-prune)
2021-04-28 01:00:05+00:00 [HiddenVM] [bootstrap.sh] Computing list of unused cached packages before stability downgrades, prog-id=12
2021-04-28 01:00:06+00:00 [HiddenVM] [bootstrap.sh] Found no packages that need downgrading
2021-04-28 01:00:06+00:00 [HiddenVM] [bootstrap.sh] Did not find extra apt list file: /media/amnesia/2fc8ccaf-8389-4878-b780-eafe98a35190/HiddenVM1/HiddenVM/extras/apt.list
2021-04-28 01:00:06+00:00 [HiddenVM] [bootstrap.sh] Did not find 'extras' script - will not run 'apt-get update'
2021-04-28 01:00:06+00:00 [HiddenVM] [bootstrap.sh] Restore package index cache for other uses, prog-id=15
2021-04-28 01:00:06+00:00 [HiddenVM] [bootstrap.sh] No cached apt lists found in /media/amnesia/2fc8ccaf-8389-4878-b780-eafe98a35190/HiddenVM1/HiddenVM/cache/var-lib-apt-for-other
2021-04-28 01:00:06+00:00 [HiddenVM] [bootstrap.sh] Configure clearnet user, prog-id=16
No protocol specified
E: [pulseaudio] client-conf-x11.c: xcb_connection_has_error() returned true
2021-04-28 01:00:08+00:00 [HiddenVM] [bootstrap.sh] Set up VirtualBox persistent configuration, prog-id=17
2021-04-28 01:00:08+00:00 [HiddenVM] [bootstrap.sh] Launching Clearnet VirtualBox, prog-id=20
2021-04-28 01:00:08+00:00 [HiddenVM] [bootstrap.sh] Did not find dotfiles directory: /media/amnesia/2fc8ccaf-8389-4878-b780-eafe98a35190/HiddenVM1/HiddenVM/extras/dotfiles
2021-04-28 01:00:08+00:00 [HiddenVM] [bootstrap.sh] Did not find extras script: /media/amnesia/2fc8ccaf-8389-4878-b780-eafe98a35190/HiddenVM1/HiddenVM/extras/extras.sh
2021-04-28 01:00:08+00:00 [HiddenVM] [bootstrap.sh] No record found for the last time the package cache was pruned (/media/amnesia/2fc8ccaf-8389-4878-b780-eafe98a35190/HiddenVM1/HiddenVM/cache/last-pkg-cache-prune)
2021-04-28 01:00:08+00:00 [HiddenVM] [bootstrap.sh] Recomputing list of unused cached packages, prog-id=23
2021-04-28 01:00:09+00:00 [HiddenVM] [bootstrap.sh] No unused packages to delete from cache
2021-04-28 01:00:09+00:00 [HiddenVM] [bootstrap.sh] Timestamp recorded for cached package prune to /media/amnesia/2fc8ccaf-8389-4878-b780-eafe98a35190/HiddenVM1/HiddenVM/cache/last-pkg-cache-prune
2021-04-28 01:00:09+00:00 [HiddenVM] [bootstrap.sh] Back up apt packages, prog-id=24
2021-04-28 01:00:09+00:00 [HiddenVM] [bootstrap.sh] Recorded Tails version 4.18 - 20210419
2021-04-28 01:00:09+00:00 [HiddenVM] [bootstrap.sh] Copy 'extras' to /media/amnesia/2fc8ccaf-8389-4878-b780-eafe98a35190/HiddenVM1/HiddenVM
2021-04-28 01:00:09+00:00 [HiddenVM] [bootstrap.sh] Done! Runtime: 758s, prog-id=25
2021-04-28 01:00:11+00:00 [HiddenVM] [launch-log-progress.sh] Reset sudo timeout policy

Installation aborted because /media/amnesia did not exist

When I executed the appimage, I got an error because /media/amnesia did not exist. I am not sure why. I am using a TAILS USB that has a persistent volume, although I did not unlock the persistent volume this time (as per the README). I did sudo mkdir /media/amnesia and re-ran the appimage and it worked fine. So, maybe throw an if-statement in there and create the directory if it doesn't already exist?

Possible audio fix

Did you try the pulseaudio tcp module? It works but I'm not sure if there's any security issues with using it.

  1. pactl load-module module-native-protocol-tcp auth-ip-acl=127.0.0.1

  2. give virtualbox an environmental variable PULSE_SERVER=tcp:127.0.0.1

  3. then something like
    iptables -I OUTPUT -o lo -p tcp -m owner --uid-owner clearnet --dport 4713 -j ACCEPT

Would that be safe to use?

Thank you.

No audio in HiddenVM>Whonix workstation

Hi,

I currently have an issue with audio playing inside my Whonix workstation. To test that this was not a Whonix only issue, I tried several other Linux distros and was unable to get sound working on any. It seems to me that the problem isn't in the virtual machine itself but

  • in the communication process between HiddenVM VirtualBox and Whonix
    or
  • in the communication process between HiddenVM VirtualBox and Tails.

All Host Audio Driver/Audio Controller combinations in Virtual Box have been tested and unfortunately none were able to get sound working. I'm unsure how else I can troubleshoot this and a couple of friends reported the same issue. Is someone able to please help?

Thanks for all the great work on HiddenVM!!! :)

Screenshot 2

Screenshot 1

Mouse randomly stop working on VirtualBox, while using my VM

Since the last update, using HiddenVM 1.33 and Tails 5.8, when using my VM, sometime the mouse randomly stop working on VirtualBox. The problem seem to happens really frequently, but I cannot find what action I do exactly who caused that issue to happens.

While the mouse stop working, the keyboard continue to work in the VM and the mouse is not frozen, but I cannot interact with anything on the entire VirtualBox (HiddenVM) app. The only way to fixed that issue is to close my VM. Once my VM is closed, the mouse start working again without issue and I can start back the VM and work on it for few minutes until the problem start again.

After looking on internet, it seem to be an issue between VitualBox and Wayland, but I actually can't find any real fixed to that issue currently, so I was wondering if there have a little something I can do, maybe a command or something I can do differently who would allow me to fixed temporarily that issue or to start the HiddenVM in a way who doesn't have that issue maybe?

If that can help, I run Whonix Workstation + Whonix Gateway VM on HiddenVM, and my Workstation is usually in full-screen.

Thank you

Possibly contains spyware

The following is how i noticed. It gave me the following error when i tried to start my virtual system: The VirtualBox Linux kernel driver is either not loaded or not set up correctly. Please try setting it up again by executing

'/sbin/vboxconfig'

as root.

Which i did, however it didn't work due to some permission problems.
It failed and told me to use dmesg to find out why. When i used dmesg i saw what it did in the background.
I picked two messages out of many:

audit: type=1400 audit(1651914430.711:1128): apparmor="DENIED" operation="open" profile="torbrowser_firefox" name="/home/amnesia/.cache/thumbnails/large/3678dc849747c84908498dd948db8f71.png" pid=10995 comm="pool-firefox"
requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000

Dropped outbound packet: IN= OUT=wlan0 SRC=i removed the adress DST=i removed the adress LEN=48 TC=0 HOPLIMIT=255 FLOWLBL=762031 PROTO=ICMPv6 TYPE=133 CODE=0 UID=0 GID=0

So it looks like it sent files from my cache to some address.
Like why does a script that is supposed to change settings open cache files and sends them somewhere?

The issue with VirtualBox

Hi,

I have been following this project for some time now. I notice some concerns about the usage of VirtualBox. The Whonix developers have given some good reasons against the usage of VirtualBox. I understand you guys are in process of porting the project to Python a new programming language which is a huge undertaking. Since HiddenVM already uses bash why not switch out VirtualBox fpr KVM (virt-manager) while you guys are working on the new Python release. This would address the main concern regarding the issue.

I noticed this project from a reddit post which said that this project brings the HiddenOS feature of veracrypt to life which is good news for vulnerable people like the Chinese OP who brought up this issue. That being said please don't take this as a criticism of your project. I am only one of the many people concerned about this issue.

Thank you for your time.

Package Verification Needed.

This software relies on packages online, which can be tampered with during transit. A verification system is highly recommended as soon as possible. Could start with SHA-512 then use GPG. Also when downloading from Github it would be great for security to be able to verify HiddenVM via GPG as this tool is included in Linux Tails.

.ova nor ovf files showing up

Hi guys , I have some simple questiion to ask I havent been able to find something similar anywhere else : After installing my HiddenVM virtualbox from my hidden volume on my USB , everything works fine , then I am asked to import the whonix .ova file from the virtualbox menu , but searching every folder including the one in which it is supposed to be , no .ova nor .ovf displayed anywhere , however when I search for them outside of my virtuabox menu (file explorer) , they are of course still there in the same hidden volume of USB...

When I check the permission of thoses files , I cant change them from "None" to "read or write" , even using root cmd , would it be the reason my virtualbox cant see them ?

My partition format is FAT for this hidden volume on which I have installed whonix files and hiddenVM image.

My tails is installed on a second USB on which veracrypt was installed in a separate persistent volume from the tails OS , but I dont know how this could have a link with my virtualbox not detecting .ova or .ovf files on the other USB.

La bise !

Important: Move to KVM ASAP

Like one of the previous issue opened. I want to thank you for this amazing tool.

VirtualBox is still vulnerable to Spectre and Meltdown which makes using it extremely dangerous for privacy activists, whistleblowers and people in countries where the internet is censored. Especially for people like me in China. It is well documented that the Chinese Communist Party will go to great lengths to control information and jail whistleblowers every chance they get. Maybe you can switch to KVM instead of VirtualBox and like the other contributor said, make another beta repository for KVM HiddenVM in the meantime while you're testing it. KVM provides better hardware performance than VirtualBox. I'm adding a link from Whonix's official website suggesting this change.

https://www.whonix.org/wiki/KVM#Why_Use_KVM_Over_VirtualBox.3F

That being said, I really appreciate the hard work you have put into this tool. You have given the oppressed like me a great piece of software to protect us.

Thanking you.

Access Tor before VM

This would be perfect for me, if you could toggle on TOR/or not. So the user can decide if they want to use Tor with the VM or not. This is possible with whonix due to the way it was created, but not with windows, ubuntu, etc.

Is there a simple way to change this in the code? so that Tails can access TOR before entering the VM?

Error on slow computer due to sudo timing out

Installation halted and log said:

[HiddenVM] [launch-log-progress.sh] Reset sudo timeout policy

I'm guessing it was just taking long than expected. Is there someway to increase the sudo timeout period or at least check and re-request root if necessary?

Edit: Upon re-executing the appimage, the process succeeded

Is it safe if the flash drive is pulled?

Was just curious if pulling the flash drive while powered on would have any adverse effects, or if everything would still be encrypted and 100% safe?

Thanks in advance!

Clean Installation of HiddenVM + Whonix Cause Audio to Not Work on Reboot

Host: Tails 4.20
Guest: Whonix 15.0.1.9.3
Appliance: HiddenVM v1.15
Virtualization: default (doesn't matter from my tests)
Audio Device: AC97 (default)
Host Audio: Alsa

Variables:
Each reinstall I ran: apt update && dist-upgrade before closing

Host:
Standard sound card in use.
Didn't have a problem until post tails update.
Previous versions worked just fine.
Audio device is current and plays speaker-test as well as settings front left/front right.

Guest:
Playing media from VLC or speaker-test results in erie sound due to dropping audio every other interval.
OpenBSD sndio option in VLC preference->audio fixed the audio dropping on VLC restart.
After reboot no amount of debugging or settings manipulation or restarting or anything provides audio (including messing around with VLC settings).
No audio through alsa or pulse.

Research:
gstreamer-plugins-good recently updated and someone complained recently about their KVM qemu setup being negatively affected.
Common front-page resolutions and regenerating the config file doesn't work.
Whonix recommends virtualbox 6.1.22 https://www.whonix.org/wiki/VirtualBox/XFCE .
HiddenVM gives virtualbox 6.1.26.

HiddenVM.log

2021-08-01 07:06:06+00:00 [HiddenVM] [bootstrap.sh] Configure clearnet user, prog-id=16
No protocol specified
E: [pulseaudio] client-conf-x11.c: xcb_connection_has_error() returned true

I have discovered that by restarting the whole computer one or many times, or maybe it's opening whonix workstation FIRST before gateway, it eventually works. Not ideal.

If you need any logs or anything specific please feel free to ask.

Offline Packages Support

It would be nice if there was a version of HiddenVM that has the packages already included, so you don't need an Internet Connection in order to use HiddenVM. It would be perfect for offline only users as it is possible there might not be Internet access, or is to risky to use the Internet. The packages could be in a new folder and copied and installed once HiddenVM is run, instead of doing apt-get over the Internet.

Veracrypt Proper Hidden Volume On SSD

Im wondering how can i create a secure veracrypt hidden volume on a SSD, cuz from what i know if u delete files on the hidden volume, an attacker could see that u have a hidden volume because of TRIMS.

Whonix Workstation graphic artifacts Tor Browser crash

Since I had update Tails to v.5.1.1 and HiddenVM to the version 1.26.1, when I open my Whonix Workstation VM and goes on Tor Browser I frequently saw weird color graphic artifacts on a part of the window. It appear and disappear randomly as I used the the browser. When I used the browser to open website like I did normally it randomly crash (It seam to happen more frequently as I open new tabs with new websites.)
Sincerely the crash is so frequent that it just make it impossible to browse on internet on Whonix.

I never had that issue before the update and I tried on 2 different version of Whonix Workstation and both have the same exact problem, so I'm sure that it is not the machine who is the problem.

I have tried with 3D acceleration enabled and disabled and in both case the same issue.

For what I see, the visual glitch happen with other app, like the file browser, specially when I move the window, but doesn't seam to crash like Tor Browser do all the time. I can still watch a video on VLC without issue or continuous visual issue, so I don't really know what's caused that weird issue exactly.

If I manage to find something I will reply at that issue and give you more information.

NS_ERROR_INVALID_ARG (0x80070057) while Importing the appliance

Hi !

I am getting the following error when importing the whonix appliance.

Versions:

Whonix-XFCE-15.0.1.4.8.ova
HiddenVM-1.5.0-x86_64.AppImage

Can your disclose with more detail what you mean with the following installation step ?

"..Create and mount a deniable, secure storage environment on internal or external media such as a VeraCrypt volume..."

I have tried with LUK filesystem, Veracrypt hidden volume (device), Veracrypt hidden volume (file), trying both on a partition, on a file and on a single disk for them.

I always get the following message when importing the appliance:

Failed to import appliance /home/clearnet/HiddenVM/Whonix-XFCE-15.0.1.4.8.ova.
Result Code: NS_ERROR_INVALID_ARG (0x80070057)

Thanks for your awesome code,

SecureBoot and VirtualBox Kernel Modules

Hello I have a host machine with secureboot enabled. Tails works fine, but when I run hiddenvm and attempt to start a VM in virtualbox I get an error saying roughly "The vboxdrv kernel module is not loaded" and it asks me run vboxconfig. Of course if I run vboxconfig it also errors out saying "If your system is using EFI Secure Boot you may need to sign the kernel modules (vboxdrv, vboxnetflt, vboxnetadp, vboxpci) before you can load them." If I disable secureboot things work fine. Is there a way around this without disabling secureboot?

Timing attacks

Doesn't HVM having access to clearnet along side tor make it vulnerable to timing attacks ?

Not an issue

Thought this was an interesting project. I've done some similar things with Vagabond Workstation and wanted to mention it in case you hadn't seen it. I'm doing Torified VMs there as well.

Suggestion: Move to KVM

Hi,

Firstly thank you for a terrific tool and the capability you're providing for us.

I've been thinking about KVM for HiddenVM as a superior and safer method over VirtualBox.

It's now well documented with guides for how to set up Windows, OS X and Linux on KVM without problem, as well as Whonix if you want a Torified OS on KVM.

Whonix's wiki provides some good reasons why to not rely on VirtualBox for long-term future:

https://www.whonix.org/wiki/KVM#Why_Use_KVM_Over_VirtualBox.3F

I also read that KVM can provide much better hardware performance vs. VirtualBox in a Linux host environment.

Would you consider KVM?
Thanks

Using Tor Bridges

Hi,

Is it OK to use Tor Project provided transport obfs4 bridges when connecting to Tor in Tails to reduce the chance of your ISP detecting you are using Tor? Will these Tor Bridges be used when you connect to Tor in Whonix Gateway and Workstation? Or are these bridges going to cause security problems. Or should they be used in the tor anonymizer connection wizard within Virtual Box - Gateway? Or should no bridges be used in the Hidden VM system?

Thanks

Appreciation Issue

It's not an issue, I just wanted to say your project is super cool and thank you! Sorry aha.

permanent crashes and sadly not usable anymore

Unfortunately HiddenVM is not usable anymore because of constantly crashes. After the launch HiddenVM in Tails, the session always crashes after a short period of usage (5 or 10 minutes). This issue has occurred for at least a year now. It looks like it won't change in the near future. For me, it is not possible to continue the usage of HiddenVM anymore. That is very sad, because I loved the project so far. I am curious what other people think and if there are others with same issues. However good luck for the future and thanks for the effort you put into this.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.