WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

697

(post is archived)

[–] 0 pt

>Tails isn't made to host virtual machines. If you want to combine whonix with another hardened OS, you'd take qubes as host.

Actually... the best way to hide a VM is to hide it invisibly with not forensic ability to reveal.

ASTOUNDING NEW FREE TOOL!! HiddenVM - Use any desktop OS without any traces! Hides your TAILS install completely! Laptops secure at coffeeshops,libraries, etc from Feds copying it!

HiddenVM – Use any desktop OS without leaving a trace , Hides your TAILS install completely!

https://github.com/aforensics/HiddenVM

https://news.ycombinator.com/item?id=22492343

There are many reasons why you may want to use HiddenVM.

whonix OS! inside HiddenVM, for TAILS on a USB, for coffeeshops or libraries: ...

I SUGGEST if you do not need OSX or Windows, to install Whonix secure Tor anonymization and TAILS inside your HiddenVM !!!
https://www.whonix.org/

There are many reasons why you may want to use HiddenVM. Some use cases include:

• You're a spy protecting national security and you need to leave NO DIGITAL TRACE ON THE HARD DRIVE of the computer you just used.

• Law enforcement agents conducting sensitive investigations.

• Diplomats, politicians, and military personnel.

• Whistle-blowers needing to safely carry their information in any situation.

• Activists, dissidents, political asylum seekers, and journalists in need of stronger protection of their information from corrupt governments when their equipment is forcibly seized. (We know that the risk of the rubber hose remains a complex problem and limitation of encryption.) Now that you can use Windows once you set it up inside Tails, keeping your data private could become easier for you.

Using Tails should never be reason to suspect you are a criminal or a spy

Hide your tails completely using HiddenVM

and I SUGGEST if you do not need OSX or Windows, to install Whonix secure Tor anonymization and TAILS !!!

https://www.whonix.org/

[–] 0 pt

HiddenVM seems hacky and unstable, and a similar effect could be achieved with a few simple commands. Like encrypt some partition via LUKS, save the header to a file, dd the header with data from /dev/urandom, have only random data on disk, dd the header from the file to the disk, have your working partitions back. You don't need a windows app like veracrypt for that. As a matter of fact, I find it suspicious, that they're using windows apps.

Besides, I don't think, that tails is meant to run as a host for VMs. It's already running from memory, so the demands on the hardware will be very high, tails uses a customized and hardened kernel, which was built without having VMs in mind, it requires installation of unhardened packages from non-tails repositories, requires you to run custom code, and all of this might lead to bugs or backdoors destroying whatever additional security tails provides.

Hardened operating systems aren't made to be as versatile as unhardened ones. The idea behind hardening is, that you lock down every kind of functionality until you're only able to perform one simple task, and nothing else. That's hardening. All those fancy ideas with OSes running on VMs which were set up with some windows crypto tool and so on sounds like it's trying to get around the hardening, and therefore decrease security. Hardened OSes only allow you to perform a few tasks for a reason.

[–] 0 pt

As a matter of fact, I find it suspicious, that they're using windows apps.

right.

if open source tools, with current source, even in windows its less sketchy, but i prefer to never have windows ever on a machine touching a path to internet. not even for maintenance.

I was just pointing out people can install windows or osx inside HiddenVM, or install Whonix