Qubes bug report:
Iâve tested this in debian-12 VM in KVM and I can reproduce the issue.
Check if vanguards is running, the service is not enabled by default when itâs installed.
Also the issue seems to be occurring after some time will pass when you visit a few sites or wait a few minutes.
Maybe only VMs are causing this but hardware doesnât?
I can confirm that this is also an issue in KVM Whonix as well.
Iâve reproduced this issue on bare metal debian as well.
Any updates on the issue? I did not see progress on the bug reports since last month, however, the problem still persists and it makes Whonix completely unusable to be honest.
Then youâre suffering from this issue for no reason. Solution available for a long time already.
No, not really. From public sources only. Quote from that Bug report:
Mike Perry assigned to @mikeperry 2 weeks ago
Mike Perry added Next label 2 weeks ago
Newer Tor version and vanguards disabling is now in the testers repository.
There was a recent incident where a Tor user (a bad one, but not relevant to the technical discussion) was deanonymized due to timing attacks. This was only possible because the police were able to trace the userâs connections back to the guard relay due to the lack of second-layer Tor relay protection (Vanguard), as he was using an outdated version of Ricochet without Vanguard enabled.
This shows that Vanguard is absolutely necessary to avoid being deanonymized on Tor. The deanonymization attack is still complicated and not trivial to pull off, but it is possible.
For this reason, I would like to ask what the current state of Whonixâs missing Vanguard problem is, and recommend that efforts to find a working solution be intensified. As far as I know, Whonix does not have Vanguard protection because it is no longer compatible. This cannot be the case with Vanguard-Lite, which is used in Tor Browser. So why not at least patch Vanguard-Lite back into Whonix?
At the same time, I hope Mr. Perry will step up his efforts on the âNextâ label (which has been attached for 9 months nowâŚ).
You can find a recent blog post about the timing/deanonymization attack on the Tor Project website. I am not able to attach the link here, maybe an admin can do that. The blog post is titled: âIs Tor still safe to use?â
Congratulations to the second duplicate of the same topic.
Because it already is.
Thanks for your reply. I wasnât aware of the other post. How can I verify that Vanguard-Lite is enabled? Also, does Vanguard-Lite work when I connect to bridges, or just in Torâs default configuration?
If you need to ask such basic questions you will also unfortunately also lack the skills to do any meaningful analysis.
Wrong forum. You can ask Tor directly.
This issue was resolved. Closing.
For anything on vanguards, there is vanguards - Additional protections for Tor Onion Services.