Is it safe to install and using exploit from linux repo on Whonix workstation?

Is the exploit activity will go only trough Tor?

Hi span_ext

Can you clarify what you are trying to do. Not sure what “exploit” you’re referring to. Do you mean jail breaking a device so you can install a different OS?

1 Like

Nobody at Whonix will help you to run exploit tools through the platform.

If you insist on asking for advice about it here you will be banned, since it is an anonymity platform, not a leg up for every dipshit who wants to create havoc on the Internet (we already have ICs for that purpose :roll_eyes:).

[Imprint] [Privacy Policy] [Cookie Policy] [Terms of Use] [E-Sign Consent] [DMCA] [Contributors] [Investors] [Priority Support] [Professional Support]