What is the best way to route traffick through Tor on kicksecure to make a persistent bootable form of Whonix

This probably sounds very stupid, and I am aware of the reasons why Whonix is what it is and why Kicksecure is what it is. While my threat model recommends Whonix quite heavily, my use case means that I cannot use a Virtual Machine, I don’t want to hear any questions on this matter, so I’ll get into what I do know.

According to the Whonix-Kicksecure Comparison Table, the only difference is that Whonix routes ALL traffic through Tor using the Gateway. Without this Workstation can’t connect to the internet, so it works like a kill switch. I know that it is possible to do this with most if not all Linux Distributions, but it is just that Whonix is a Virtual Machine and it is much more secure in its Tor Network guarantee. If this is the case, then how can I make Kicksecure act similarly (route all traffick through Tor with a kill switch for that security) to be as close to Whonix as possible in the form of a Bootable OS.

And yes, I acknowledge that it will be as good as Whonix but once a VM will not fit my use case and I will only use it if the option I seek is 100% impossible, which I know it is not.

Just use kick secure & use virtual box inside it with Whonix

Duplicate of:

Because this is anonymity-focused, this is more of a topic for the Whonix forum. Therefore, closing.

1 Like