{"vulnerability": "cve-2025-30712", "sightings": [{"uuid": "523a136e-df62-4d30-80ea-d0a609da80aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30712", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12184", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30712\n\ud83d\udd25 CVSS Score: 8.1 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L)\n\ud83d\udd39 Description: Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core).   The supported version that is affected is 7.1.6. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change).  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as  unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).\n\ud83d\udccf Published: 2025-04-15T20:31:10.623Z\n\ud83d\udccf Modified: 2025-04-17T03:55:27.026Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpuapr2025.html", "creation_timestamp": "2025-04-17T04:57:25.000000Z"}, {"uuid": "7f5d93d2-b97f-45d1-ac7c-3c1303b021b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30712", "type": "published-proof-of-concept", "source": "Telegram/xw4F_YrdNt0Xua-SYjsnLhL7dqba0lqm-0lIqZ21N9DV39w", "content": "", "creation_timestamp": "2025-06-26T15:00:06.000000Z"}, {"uuid": "3cb82616-fe69-4da8-989d-780ef2069f95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30712", "type": "published-proof-of-concept", "source": "Telegram/seeOg7d7Xdx0LWEqXd7dvE90Oq6nBMNvrC8yGWUmnEYbL4k", "content": "", "creation_timestamp": "2025-06-26T03:00:05.000000Z"}, {"uuid": "33e93f41-ee4e-4715-abde-03037b167910", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30712", "type": "seen", "source": "https://bsky.app/profile/akirashibazaki.bsky.social/post/3lstib7oaik2m", "content": "", "creation_timestamp": "2025-06-30T15:19:39.723477Z"}, {"uuid": "53c92fe4-e5c4-4ab2-9091-7c01a25029e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30712", "type": "published-proof-of-concept", "source": "https://t.me/technical_private_cat/547", "content": "Welcome to my Alice tea party! \ud83e\uded6\ud83c\udf80\nI decided to write a series of short posts about secure operating systems \ud83d\udda5\ud83d\udc27\n\nToday, we'll take a look at Whonix and find out if it's as good and anonymous as people say. Spoiler alert: no, it's not. \n\nLet me clarify right away: Whonix is not a full-fledged operating system, but a tool for anonymity that can work independently or as a router in Qubes OS. In this article, I will focus on analyzing how it works as a standalone system \n\nHow does Whonix work?\ud83e\udde9\nWhonix is built on two virtual machines: Whonix-Gateway and Whonix-Workstation. Gateway configures and routes all your traffic through the Tor network. Workstation is your workplace. If you want to dig deeper, check out their documentation.\n\nProblems with Whonix \ud83d\udd13\nNow to the point: why Whonix isn't really necessary. Let's start with Gateway. It's just Debian with Tor pre-installed and a bunch of scripts that redirect traffic through Tor. Everything is tied to the configuration in the settings file and iptables rules. Cool? Not really. Plus, Whonix drags along old Debian, where packages are updated once in a blue moon.\n\nWhonix positions itself as super protection against leaks, but if you don't understand what you're doing, no virtual machine will save you. For example, if you run a browser with JavaScript or download files and then open them outside of Workstation, your anonymity is gone.\n\nBy the way, Whonix can only be run without problems on VirtualBox. You may argue that there are versions for KVM/QEMU on their website. But that's where the problems begin. If you take Whonix for KVM, you won't be able to install it just like that \u2014 you need to edit the configuration, and there are no detailed instructions on how to do this anywhere. With VirtualBox, however, there are no such problems \u2014 everything works out of the box. \n\nBut what's wrong with VirtualBox?\ud83e\udea4\nBesides the fact that it is significantly slower than KVM. In March 2025, a vulnerability CVE-2025-30712 with a rating of 8.1 appeared in Virtualbox. It allows an attacker with access to the host system to perform a VM escape, i.e., to get out of the virtual machine onto your main computer\ud83e\udee0. Proof-of-concept is already circulating on the network, and exploitation is easier than it seems. If the host is compromised, all your anonymity goes down the drain, and your real IP or other data may leak. \n\nHow to make an analogue of Whunix Gateway? \u2699\ufe0f\nBut there is another way. The Gateway model itself is not bad. But you can create a machine with it yourself without Whunix, using a minimalist Linux (such as Gentoo or even FreeBSD instead of Linux). Then configure Tor directly. After all, Gateway is just a wrapper around the standard Tor and iptables settings, which can be found on Google in five minutes. Now add the iptables you found and DNSPort to the Tor config so that DNS requests also go through Tor, and that's it. This takes up less space and reduces the attack surface. \n\nConclusion\nTo be fair, Whonix isn't always bad. But it can be useful in conjunction with Qubes OS (where it runs in KVM, by the way), which has additional security mechanisms, such as domain isolation, that enhance security.  But apart from Qubes, Whonix is pretty pointless. You might think it's suitable for those who don't want to bother with configuring Tor, but that's not the case. To run Whonix on a decent VM, such as KVM, you'll have to go through just as much trouble.\n\nThe bottom line is simple: Whonix is not a super-anonymous OS, but a tool that complicates life more than it protects it  \ud83d\udc8a\n\nI hope you found this useful.\u2764\ufe0f\u2728  If you wish, you can explore the topic yourself by reading research and testing the system.\n\nHere are some good articles about Whonix:\nTHESIS.pdf \u2014 here is an overview of anonymous operating systems, including Whonix.\nWhonix and Tor Limitations \u2014 about the shortcomings of Whonix and Tor.\nJOSH Article \u2014 analysis of Whonix limitations.\n\n#anonymity #linux #whunix #cve #anonymity_os #tor #security", "creation_timestamp": "2025-06-30T11:19:01.000000Z"}, {"uuid": "753d2259-3d50-48ab-81cc-c3d314fd3892", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30712", "type": "published-proof-of-concept", "source": "https://t.me/technical_private_cat/546", "content": "\u0414\u043e\u0431\u0440\u043e \u043f\u043e\u0436\u0430\u043b\u043e\u0432\u0430\u0442\u044c \u043d\u0430 \u043c\u043e\u0451 \u0447\u0430\u0435\u043f\u0438\u0442\u0438\u0435 \u0410\u043b\u0438\u0441\u044b! \ud83e\uded6\ud83c\udf80\n\u042f \u0440\u0435\u0448\u0438\u043b\u0430 \u0441\u0434\u0435\u043b\u0430\u0442\u044c \u0446\u0438\u043a\u043b \u043d\u0435\u0431\u043e\u043b\u044c\u0448\u0438\u0445 \u043f\u043e\u0441\u0442\u043e\u0432 \u043f\u0440\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \ud83d\udda5\ud83d\udc27\n\n\u0421\u0435\u0433\u043e\u0434\u043d\u044f \u0440\u0430\u0437\u0431\u0435\u0440\u0451\u043c Whonix \u0438 \u0432\u044b\u044f\u0441\u043d\u0438\u043c, \u0442\u0430\u043a \u043b\u0438 \u043e\u043d \u0445\u043e\u0440\u043e\u0448 \u0438 \u0430\u043d\u043e\u043d\u0438\u043c\u0435\u043d, \u043a\u0430\u043a \u043e \u043d\u0451\u043c \u0433\u043e\u0432\u043e\u0440\u044f\u0442. \u0421\u043f\u043e\u0439\u043b\u0435\u0440: \u043d\u0435\u0442. \n\n\u0421\u0440\u0430\u0437\u0443 \u043e\u0431\u043e\u0437\u043d\u0430\u0447\u0443: Whonix \u2014 \u044d\u0442\u043e \u043d\u0435 \u043f\u043e\u043b\u043d\u043e\u0446\u0435\u043d\u043d\u0430\u044f \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u0430 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0434\u043b\u044f \u0430\u043d\u043e\u043d\u0438\u043c\u043d\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u043e\u0435 \u043c\u043e\u0436\u0435\u0442 \u0440\u0430\u0431\u043e\u0442\u0430\u0442\u044c \u0441\u0430\u043c\u043e\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0438\u043b\u0438 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0440\u043e\u0443\u0442\u0435\u0440\u0430 \u0432 Qubes OS. \u0412 \u044d\u0442\u043e\u0439 \u0441\u0442\u0430\u0442\u044c\u0435 \u044f \u0441\u043e\u0441\u0440\u0435\u0434\u043e\u0442\u043e\u0447\u0443\u0441\u044c \u043d\u0430 \u0440\u0430\u0437\u0431\u043e\u0440\u0435 \u0435\u0433\u043e \u0440\u0430\u0431\u043e\u0442\u044b \u043a\u0430\u043a \u0441\u0430\u043c\u043e\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b  \n\n\u041a\u0430\u043a \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 Whonix?\ud83e\udde9\nWhonix \u043f\u043e\u0441\u0442\u0440\u043e\u0435\u043d \u043d\u0430 \u0434\u0432\u0443\u0445 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0445 \u043c\u0430\u0448\u0438\u043d\u0430\u0445: Whonix-Gateway \u0438 Whonix-Workstation. Gateway \u043d\u0430\u0441\u0442\u0440\u0430\u0438\u0432\u0430\u0435\u0442 \u0438 \u043f\u0443\u0441\u043a\u0430\u0435\u0442 \u0432\u0435\u0441\u044c \u0432\u0430\u0448 \u0442\u0440\u0430\u0444\u0438\u043a \u0447\u0435\u0440\u0435\u0437 \u0441\u0435\u0442\u044c Tor. Workstation \u2014 \u044d\u0442\u043e \u0432\u0430\u0448\u0435 \u0440\u0430\u0431\u043e\u0447\u0438\u0435 \u043c\u0435\u0441\u0442\u043e. \u0415\u0441\u043b\u0438 \u0445\u043e\u0442\u0438\u0442\u0435 \u0440\u0430\u0437\u043e\u0431\u0440\u0430\u0442\u044c\u0441\u044f \u0433\u043b\u0443\u0431\u0436\u0435, \u0437\u0430\u0433\u043b\u044f\u043d\u0438\u0442\u0435 \u0432 \u0438\u0445 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0430\u0446\u0438\u044e.\n\n\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u044b Whonix \ud83d\udd13\n\u0422\u0435\u043f\u0435\u0440\u044c \u043a \u0441\u0443\u0442\u0438, \u043f\u043e\u0447\u0435\u043c\u0443 Whonix \u043d\u0435 \u0442\u0430\u043a \u0443\u0436 \u043d\u0443\u0436\u0435\u043d. \u041d\u0430\u0447\u043d\u0451\u043c \u0441 Gateway. \u042d\u0442\u043e \u043f\u0440\u043e\u0441\u0442\u043e Debian \u0441 \u043f\u0440\u0435\u0434\u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044b\u043c Tor \u0438 \u043a\u0443\u0447\u0435\u0439 \u0441\u043a\u0440\u0438\u043f\u0442\u043e\u0432, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u0435\u0440\u0435\u043d\u0430\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0442 \u0442\u0440\u0430\u0444\u0438\u043a \u0447\u0435\u0440\u0435\u0437 Tor. \u0412\u0441\u0451 \u0437\u0430\u0432\u044f\u0437\u0430\u043d\u043e \u043d\u0430 \u043a\u043e\u043d\u0444\u0438\u0433\u0435 \u0432 \u0444\u0430\u0439\u043b\u0435 \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043a \u0438 \u043f\u0440\u0430\u0432\u0438\u043b\u0430\u0445 iptables. \u041a\u0440\u0443\u0442\u043e? \u041d\u0435 \u043e\u0447\u0435\u043d\u044c. \u041f\u043b\u044e\u0441 Whonix \u0442\u044f\u043d\u0435\u0442 \u0437\u0430 \u0441\u043e\u0431\u043e\u0439 \u0441\u0442\u0430\u0440\u044b\u0439 Debian, \u0433\u0434\u0435 \u043f\u0430\u043a\u0435\u0442\u044b \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u0440\u0430\u0437 \u0432 \u0441\u0442\u043e \u043b\u0435\u0442.\n\nWhonix \u043f\u043e\u0437\u0438\u0446\u0438\u043e\u043d\u0438\u0440\u0443\u0435\u0442 \u0441\u0435\u0431\u044f \u043a\u0430\u043a \u0441\u0443\u043f\u0435\u0440\u0437\u0430\u0449\u0438\u0442\u0443 \u043e\u0442 \u0443\u0442\u0435\u0447\u0435\u043a, \u043d\u043e, \u0435\u0441\u043b\u0438 \u0432\u044b \u043d\u0435 \u043f\u043e\u043d\u0438\u043c\u0430\u0435\u0442\u0435, \u0447\u0442\u043e \u0434\u0435\u043b\u0430\u0435\u0442\u0435, \u043d\u0438\u043a\u0430\u043a\u0430\u044f \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u043a\u0430 \u0432\u0430\u0441 \u043d\u0435 \u0441\u043f\u0430\u0441\u0451\u0442. \u041d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u0435\u0441\u043b\u0438 \u0432\u044b \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u0435\u0442\u0435 \u0431\u0440\u0430\u0443\u0437\u0435\u0440 \u0441 JavaScript \u0438\u043b\u0438 \u0441\u043a\u0430\u0447\u0438\u0432\u0430\u0435\u0442\u0435 \u0444\u0430\u0439\u043b\u044b, \u0430 \u043f\u043e\u0442\u043e\u043c \u043e\u0442\u043a\u0440\u044b\u0432\u0430\u0435\u0442\u0435 \u0438\u0445 \u0432\u043d\u0435 Workstation, \u0432\u0430\u0448\u0430 \u0430\u043d\u043e\u043d\u0438\u043c\u043d\u043e\u0441\u0442\u044c \u043d\u0430\u043a\u0440\u044b\u043b\u0430\u0441\u044c. \n\n\u041a\u0441\u0442\u0430\u0442\u0438, Whonix \u043c\u043e\u0436\u043d\u043e \u0437\u0430\u043f\u0443\u0441\u0442\u0438\u0442\u044c \u0431\u0435\u0437 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u0442\u043e\u043b\u044c\u043a\u043e \u0434\u043b\u044f VirtualBox. \u0412\u044b \u043c\u043e\u0436\u0435\u0442\u0435 \u0432\u043e\u0437\u0440\u0430\u0437\u0438\u0442\u044c, \u043c\u043e\u043b, \u043d\u0430 \u0438\u0445 \u0441\u0430\u0439\u0442\u0435 \u0435\u0441\u0442\u044c \u0432\u0435\u0440\u0441\u0438\u0438 \u0434\u043b\u044f KVM/QEMU. \u041d\u043e \u0442\u0443\u0442 \u043d\u0430\u0447\u0438\u043d\u0430\u044e\u0442\u0441\u044f \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b. \u0415\u0441\u043b\u0438 \u0432\u044b \u0431\u0435\u0440\u0451\u0442\u0435 Whonix \u0434\u043b\u044f KVM, \u043f\u0440\u043e\u0441\u0442\u043e \u0442\u0430\u043a \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u0435\u0433\u043e \u043d\u0435 \u0432\u044b\u0439\u0434\u0435\u0442 \u2014 \u043d\u0443\u0436\u043d\u043e \u043f\u0440\u0430\u0432\u0438\u0442\u044c \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u044e, \u043f\u0440\u0438\u0447\u0451\u043c \u043e\u0431 \u044d\u0442\u0438\u0445 \u0442\u043e\u043d\u043a\u043e\u0441\u0442\u044f\u0445 \u043d\u0438\u0433\u0434\u0435 \u0442\u043e\u043b\u043a\u043e\u043c \u043d\u0435 \u043d\u0430\u043f\u0438\u0441\u0430\u043d\u043e. \u0410 \u0432\u043e\u0442 \u0441 VirtualBox \u0442\u0430\u043a\u0438\u0445 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u043d\u0435\u0442 \u2014 \u0432\u0441\u0451 \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u0438\u0437 \u043a\u043e\u0440\u043e\u0431\u043a\u0438. \n\n\u041d\u043e \u0447\u0435\u043c \u043f\u043b\u043e\u0445 VirtualBox?\ud83e\udea4\u00a0 \n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e \u0447\u0442\u043e \u043e\u043d \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u043e \u043c\u0435\u0434\u043b\u0435\u043d\u043d\u0435\u0435 KVM. \u0412 \u043c\u0430\u0440\u0442\u0435 2025 \u0433\u043e\u0434\u0430 \u0432 Virtualbox \u043f\u043e\u044f\u0432\u0438\u043b\u0430\u0441\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2025-30712 \u0441 \u043e\u0446\u0435\u043d\u043a\u043e\u0439 8.1. \u041e\u043d\u0430 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0441 \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c \u043a \u0445\u043e\u0441\u0442-\u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0443\u0441\u0442\u0440\u043e\u0438\u0442\u044c VM-\u044d\u0441\u043a\u0435\u0439\u043f, \u0442\u043e \u0435\u0441\u0442\u044c \u0432\u044b\u0431\u0440\u0430\u0442\u044c\u0441\u044f \u0438\u0437 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u043a\u0438 \u043d\u0430 \u0442\u0432\u043e\u0439 \u043e\u0441\u043d\u043e\u0432\u043d\u043e\u0439 \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\ud83e\udee0. Proof-of-concept \u0443\u0436\u0435 \u0433\u0443\u043b\u044f\u0435\u0442 \u043f\u043e \u0441\u0435\u0442\u0438, \u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u043f\u0440\u043e\u0449\u0435, \u0447\u0435\u043c \u043a\u0430\u0436\u0435\u0442\u0441\u044f. \u0415\u0441\u043b\u0438 \u0445\u043e\u0441\u0442 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d, \u0432\u0441\u044f \u0432\u0430\u0448\u0430 \u0430\u043d\u043e\u043d\u0438\u043c\u043d\u043e\u0441\u0442\u044c \u043b\u0435\u0442\u0438\u0442 \u0432 \u0442\u0440\u0443\u0431\u0443, \u0438 \u0432\u0430\u0448 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0439 IP \u0438\u043b\u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u0443\u0442\u0435\u0447\u044c. \n\n\u041a\u0430\u043a \u0441\u0434\u0435\u043b\u0430\u0442\u044c \u0430\u043d\u0430\u043b\u043e\u0433 Whunix Gateway? \u2699\ufe0f\n\u041d\u043e \u0435\u0441\u0442\u044c \u0434\u0440\u0443\u0433\u043e\u0439 \u043f\u0443\u0442\u044c. \u0421\u0430\u043c\u0430 \u043c\u043e\u0434\u0435\u043b\u044c \u0441 Gateway \u043d\u0435\u043f\u043b\u043e\u0445\u0430\u044f. \u041d\u043e \u043c\u0430\u0448\u0438\u043d\u0443 \u0441 \u043d\u0438\u043c \u043c\u043e\u0436\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u0442\u044c \u0441\u0430\u043c\u043e\u043c\u0443 \u0431\u0435\u0437 \u0443\u0447\u0430\u0441\u0442\u0438\u044f Whunix, \u0431\u0435\u0440\u0451\u0442\u0435 \u043c\u0438\u043d\u0438\u043c\u0430\u043b\u0438\u0441\u0442\u0438\u0447\u043d\u044b\u0439 Linux(\u0432\u0440\u043e\u0434\u0435 Gentoo \u0438\u043b\u0438 \u0432\u043e\u043e\u0431\u0449\u0435 \u043d\u0435 Linux, \u0430 FreeBSD). \u0414\u0430\u043b\u0435\u0435 \u043d\u0430\u0441\u0442\u0440\u0430\u0438\u0432\u0430\u0439\u0442\u0435 Tor \u043d\u0430\u043f\u0440\u044f\u043c\u0443\u044e. \u0412\u0435\u0434\u044c Gateway \u044d\u0442\u043e \u043b\u0438\u0448\u044c \u043e\u0431\u0451\u0440\u0442\u043a\u0430 \u0432\u043e\u043a\u0440\u0443\u0433 \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u0445 \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043a Tor \u0438 iptables, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0436\u043d\u043e \u043d\u0430\u0439\u0442\u0438 \u0432 Google \u0437\u0430 \u043f\u044f\u0442\u044c \u043c\u0438\u043d\u0443\u0442. \u0422\u0435\u043f\u0435\u0440\u044c \u043f\u0440\u0438\u043f\u0438\u0441\u044b\u0432\u0430\u0439\u0442\u0435 \u043d\u0430\u0439\u0434\u0435\u043d\u043d\u044b\u0435 iptables, \u0438 DNSPort \u0432 \u043a\u043e\u043d\u0444\u0438\u0433\u0435 Tor, \u0447\u0442\u043e\u0431\u044b DNS-\u0437\u0430\u043f\u0440\u043e\u0441\u044b \u0442\u043e\u0436\u0435 \u0448\u043b\u0438 \u0447\u0435\u0440\u0435\u0437 Tor, \u0438 \u0432\u0441\u0451. \u042d\u0442\u043e \u0442\u0440\u0430\u0442\u0438\u0442 \u0438 \u043c\u0435\u043d\u044c\u0448\u0435 \u043c\u0435\u0441\u0442\u0430 \u0443\u043c\u0435\u043d\u044c\u0448\u0430\u0435\u0442 \u043f\u043e\u0432\u0435\u0440\u0445\u043d\u043e\u0441\u0442\u044c \u0430\u0442\u0430\u043a\u0438. \n\n\u0412\u044b\u0432\u043e\u0434 \n\u0421\u043f\u0440\u0430\u0432\u0435\u0434\u043b\u0438\u0432\u043e\u0441\u0442\u0438 \u0440\u0430\u0434\u0438, Whonix \u043d\u0435 \u0432\u0441\u0435\u0433\u0434\u0430 \u043f\u043b\u043e\u0445. \u041d\u043e \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u043f\u043e\u043b\u0435\u0437\u0435\u043d \u0432 \u0441\u0432\u044f\u0437\u043a\u0435 \u0441 Qubes OS(\u0433\u0434\u0435 \u043e\u043d, \u043a\u0441\u0442\u0430\u0442\u0438, \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u0432 KVM), \u0433\u0434\u0435 \u0435\u0441\u0442\u044c \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u044b \u0437\u0430\u0449\u0438\u0442\u044b, \u0432\u0440\u043e\u0434\u0435 \u0438\u0437\u043e\u043b\u044f\u0446\u0438\u0438 \u0434\u043e\u043c\u0435\u043d\u043e\u0432, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0443\u0441\u0438\u043b\u0438\u0432\u0430\u044e\u0442 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c.\u00a0 \u041d\u043e \u0432 \u043e\u0442\u0440\u044b\u0432\u0435 \u043e\u0442 Qubes ,Whonix \u2014 \u0434\u043e\u0432\u043e\u043b\u044c\u043d\u043e \u0431\u0435\u0441\u0441\u043c\u044b\u0441\u043b\u0435\u043d\u043d\u0430\u044f \u0448\u0442\u0443\u043a\u0430. \u041c\u043e\u0436\u043d\u043e \u043f\u043e\u0434\u0443\u043c\u0430\u0442\u044c, \u0447\u0442\u043e \u043e\u043d \u043f\u043e\u0434\u0445\u043e\u0434\u0438\u0442 \u0434\u043b\u044f \u0442\u0435\u0445, \u043a\u0442\u043e \u043d\u0435 \u0445\u043e\u0447\u0435\u0442 \u0437\u0430\u043c\u043e\u0440\u0430\u0447\u0438\u0432\u0430\u0442\u044c\u0441\u044f \u0441 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u043e\u0439 Tor, \u043d\u043e \u044d\u0442\u043e \u043d\u0435 \u0442\u0430\u043a. \u0427\u0442\u043e\u0431\u044b \u0437\u0430\u043f\u0443\u0441\u0442\u0438\u0442\u044c Whonix \u043d\u0430 \u043f\u0440\u0438\u043b\u0438\u0447\u043d\u043e\u0439 VM, \u0432\u0440\u043e\u0434\u0435 KVM, \u043f\u0440\u0438\u0434\u0451\u0442\u0441\u044f \u043f\u043e\u043c\u0443\u0447\u0438\u0442\u044c\u0441\u044f \u043d\u0435 \u043c\u0435\u043d\u044c\u0448\u0435.\n\n\u0418\u0442\u043e\u0433 \u043f\u0440\u043e\u0441\u0442\u043e\u0439, Whonix \u043d\u0435 \u0441\u0443\u043f\u0435\u0440 \u0430\u043d\u0430\u043d\u0438\u043c\u043d\u0430\u044f \u043e\u0441, \u0430 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0431\u043e\u043b\u044c\u0448\u0435 \u0443\u0441\u043b\u043e\u0436\u043d\u044f\u0435\u0442 \u0436\u0438\u0437\u043d\u044c, \u0447\u0435\u043c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u0442 \ud83d\udc8a\n\n\u041d\u0430\u0434\u0435\u044e\u0441\u044c \u0432\u0430\u043c \u0431\u044b\u043b\u043e \u043f\u043e\u043b\u0435\u0437\u043d\u043e. \u2764\ufe0f\u2728 \u0415\u0441\u043b\u0438 \u0445\u043e\u0442\u0438\u0442\u0435, \u0432\u044b \u043c\u043e\u0436\u0435\u0442\u0435 \u0441\u0430\u043c\u0438 \u0440\u0430\u0437\u043e\u0431\u0440\u0430\u0442\u044c\u0441\u044f \u0432 \u0442\u0435\u043c\u0435, \u0430 \u0438\u043c\u0435\u043d\u043d\u043e \u043f\u043e\u0447\u0438\u0442\u0430\u0442\u044c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f \u0438 \u043f\u043e\u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u0443. \n\n\u0412\u043e\u0442 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0445\u043e\u0440\u043e\u0448\u0438\u0445 \u0441\u0442\u0430\u0442\u0435\u0439 \u043f\u0440\u043e whunix:\nTHESIS.pdf \u2014 \u0442\u0443\u0442 \u043e\u0431\u0437\u043e\u0440 \u0430\u043d\u043e\u043d\u0438\u043c\u043d\u044b\u0445 \u043e\u0441, \u0432\u043a\u043b\u044e\u0447\u0430\u044f Whonix.\nWhonix and Tor Limitations \u2014 \u043e \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u0445 Whonix \u0438 Tor.\nJOSH Article \u2014 \u0430\u043d\u0430\u043b\u0438\u0437 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0439 Whonix.\n\n#anonymity #linux #whunix #cve #anonymity_os #tor #security", "creation_timestamp": "2025-06-30T11:19:22.000000Z"}, {"uuid": "beafdca3-6c54-4991-91e7-666171f4e419", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30712", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114344414863733394", "content": "", "creation_timestamp": "2025-04-15T22:48:39.839673Z"}, {"uuid": "8da81e82-1e23-46b4-8af7-ec84e318d311", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30712", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmvd77q6rd2v", "content": "", "creation_timestamp": "2025-04-16T00:23:14.771350Z"}]}