Continuing the discussion from How do you think the idea that adding censorship circumvention tools to WhonixGateway:
I live in China where Tor is censored. So every time I use Whonix, I have to tunnel all Tor related traffic through a censorship circumvention tool. And the following steps are what I did:
1. Set up a windows vm with two network cards;
2. Configure the first one to NAT,IPv4:10.0.2.x,Subnetmask:255.255.255.0,Default Gateway:10.0.2.2;
3. Configure the second one to Internal-whonix,IPv4:10.152.152.y,Subnetmask:255.255.255.0;
4. Install a censorship circumvention tool in the windows vm, bouncing to 127.0.0.0:1234;
5. Install Privoxy in the windows vm;
6. Configure Privoxy by adding:
Forward / 127.0.0.1:1234
7. Configure the torrc file in Whonix-Gateway by adding:
Currently, it works. But the problems are:
1. Am I doing something wrong?
2. What threats should I be careful about when using Whonix this way?
3. Is there anything I can do to improve my safety or/and anonymity?
I’ll list some Q&A in case you want to know:
1. Q: Why not use pluggable transport instead of censorship circumvention tools?
A: Because even pluggable transport is censored.
2. Q: Why use windows platform instead of Unix-like system?
A: I’d love to, however, most censorship circumvention tools which work well in China only support windows.
3. Q: Why running censorship circumvention tools in windows-vm instead of host?
A: Apart from the answer above, I don’t want to put my host at risk by running additional software.
Sorry for the long boring post, and thank you guys for helping me!