Implementation and Analysis of Profiling Mechanism for Anonymity and Privacy on Whonix Operating System
Abstract
This research will implement anonymity using the Whonix operating system. This research seeks to analyze the features of the Whonix operating system that can support anonymity and privacy profiling, the function of anonymity and privacy profiling on the operating system, and the character of the operating system capable of maintaining anonymity and privacy. Features owned by the Whonix operating system that support anonymity and privacy profiling on Whonix are application, network, and operating system aspects, as well as analyzing anonymity and privacy functions with metrics. This research produces metrics on each aspect. The application aspect obtained metrics of data encryption, metadata protection, and privacy by design by analyzing profiling experiments on KeePassXC and GnuPG applications. The network aspect uses Tor compatibility, IP Address obfuscation, and logging policy metrics by analyzing profiling experiments on Wireguard and DNSLeakTest. While the operating system aspect uses data encryption, logging and monitoring, and access control metrics by analyzing profiling experiments with fingerprinting and backup and restore scenarios. The results of this study obtained scoring profiling of the Whonix operating system, application aspect profiling scenarios with a score of 1o, network aspects with a total score of 11, and operating system aspects with a total score of 10. So it is obtained from the results of this study that all aspects of the application, network, and operating system were successful by 97% as measured based on the measurement metrics of each aspect.
Downloads
References
M. Hlatshwayo, “CYBERSECURITY IN THE DIGITAL SPACE,” Oct. 2023, [Online]. Available: https://www.researchgate.net/publication/375115830
L. Kim, “Cybersecurity: Ensuring Confidentiality, Integrity, and Availability of Information,” Jan. 2022, doi: 10.1007/978-3-030-91237-6_26.
B. Lundgren, “Beyond the concept of anonymity: what is really at stake.” Big data and democracy. 2020.
H. Barstad and C. Li, “Deanonymizing communications on The Onion Router (TOR) network with Deep Learning,” 2021. [Online]. Available: https://github.com/HallyB96/TOR-Deep-Fingerprinting-Master-Thesis.
A. Hulina, “Operating systems for privacy and anonymity: a survey B,” Brno, 2020.
M. B. Betel de Robles, J. C. Anthony Hermocilla, and J. P. Pabico, “Characterization and Classification of Malware Traffic over the Tor Network,” Computing Society of the Philippines, Inc, 2020.
P. Choorod and G. Weir, “Tor Traffic Classification Based on Encrypted Payload Characteristics,” in Proceedings - 2021 IEEE 4th National Computing Colleges Conference, NCCC 2021, Institute of Electrical and Electronics Engineers Inc., Mar. 2021. doi: 10.1109/NCCC49330.2021.9428874.
J. Perno and C. W. Probst, “Human Aspects of Information Security, Privacy and Trust,” T. Tryfonas, Ed., in Lecture Notes in Computer Science. Cham: Springer International Publishing, 2017. doi: 10.1007/978-3-319-58460-7.
O. Eriksson and P. J. Ågerfalk, “Speaking things into existence: Ontological foundations of identity representation and management,” Information Systems Journal, vol. 32, no. 1, pp. 33–60, Jan. 2022, doi: 10.1111/isj.12330.
F. M. Purba, P. Warih, and M. Saputra, “Design Of Enterprise Resource Planning System In Inventory Management Module Using Odoo Application With Quickstart Method In Pharmacy Room Of Puskesmas III Denpasar Utara,” 2021.
A. Master, “Password Managers: Secure Passwords the Easy Way,” Center for Education and Research in Information Assurance and Security (CERIAS), 2022, doi: 10.5703/1288284317618.
W. Mahanan, W. A. Chaovalitwongse, and J. Natwichai, “Data privacy preservation algorithm with k-anonymity,” World Wide Web, vol. 24, no. 5, pp. 1551–1561, Sep. 2021, doi: 10.1007/s11280-021-00922-2.
T. Oesch, “An Analysis of Modern Password Manager Security and Usage on An Analysis of Modern Password Manager Security and Usage on Desktop and Mobile Devices Desktop and Mobile Devices,” Information Security Commons, Other Computer Engineering Commons, 2021.
A. Z. Mardiansyah, A. Zubaidi, A. H. Jatmika, and R. B. Huwae, “Implementation of GNU Privacy Guard (GPG) Hybrid Encryption to Improve Information Security in Electronic Signature (E-Sign) Services at the University of Mataram,” 2024.
K. Nair, P. Maitreyi, E. Sushma, and A. H. M, “Providing Security for a Chat Application using RSA Encryption with GPG,” International Conference for Innovation in Technology (INOCON), pp. 1–5, 2024, doi: 10.1109/INOCON60754.2024.10511348.
A. Anbarje, M. Sabbagh, and D. P. Palacin, “Evaluation of WireGuard and OpenVPN,” Dissertation, 2020.
P. A. Wu supervised by Tanja Lange Jacob Appelbaum Jason Donenfeld, “Analysis of the WireGuard protocol,” 2019.
V. Johansson, “A COMPARISON OF OPENVPN AND WIREGUARD ON ANDROID,” Computer Science, 2024.
A. M. Taib, “Securing Network Using Raspberry Pi by Implementing VPN, Pi-Hole, and IPS (VPiSec),” International Journal of Advanced Trends in Computer Science and Engineering, vol. 9, no. 1.3, pp. 457–464, Jun. 2020, doi: 10.30534/ijatcse/2020/7291.32020.
Jr. Jonathan A. Goohs, “CULR_Fall_Journal_Apr_Revision,” COLUMBIA UNDERGRADUATE LAW REVIEW, vol. XVIII, no. 1, pp. 133–134, 2021.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Implementation and Analysis of Profiling Mechanism for Anonymity and Privacy on Whonix Operating System
Pages: 23-33
Copyright (c) 2024 Yana J S Batunanggar, Adityas Widjajarto, M Tegoeh Kurniawan

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).






















