Tor Stable Upgrade – Testers Wanted!

Updated Tor was uploaded to Whonix stable-proposed-updates as well as to testers repository.

Instructions for changing Whonix repository:

Then just do a update:

Posted in Testers wanted!

Announcing unMessage: a Next-Gen Tor Messenger

unMessage is an anonymous messenger that uses Tor to hide metadata of participants. Its still in early development, however a major new feature such as Tor-to-Tor audio chat (the first such implementation we are aware of) has been included. Major additions like file-sharing support, video conferencing and a portable code-base for mobile platforms are planned.

Their major goal is to provide a better UX and a competitive feature set to move users away from proprietary solutions that don’t respect privacy. Its not ready for mass adoption yet, so only the more technical audience among you should go ahead try it out. Feedback and/or pull requests are highly appreciated.

Check it out on Github:

Posted in Contribute, General Security News, Testers wanted!, Whonix Misc News, Whonix New Features

Tor Stable Upgrade – Testers Wanted!

Tor was updated to in Whonix stable-proposed-updates as well as in testers repository.

Instructions for changing Whonix repository:

Then just do a update:

Posted in Testers wanted!

[Release] Whonix-Installer and UI

Disclaimer: Please remember that Windows is NOT a secure host operating system for a variety of reasons. This Installer was mainly created to make it easy for people to experience Whonix first hand without the requirement of installing an entirely new OS. Under no circumstances, use Windows for sensitive work.


After almost a year of active development, we are releasing the Whonix-Installer which will provide a simple and familiar way for Windows users to gain access to Whonix and its massive capabilities as well as toolset.

Currently, the Whonix-Installer for Windows is based on nsisbi, a fork of the often used “Nullsoft Scriptable Install System”, which was required to circumvent the general size limit of 2Gb usually enforced by “NSIS”. Even with that though, a bit of additional modification was required to include all the files required for Whonix into one simple to use “.exe file”. That’s why for the foreseeable future, a disk-space of 8Gb is required during installation, as the Gateway and Workstation required additional compression, since even “nsisbi” has a single file size limit of 4Gb. Thus, during installation, both Gateway and Workstation take temporarily double the disk space, during the decompression process.

Adding to this however, the Whonix-Installer can be used regardless of whether you’ve installed VirtualBox previously or not. Any older virtual machines should be unmodified by using the Whonix-Installer.

Furthermore, a small, simple user interface, named “Whonix-UI” or alternatively “Whonix for Windows”/”Whonix.exe” has been created to make starting and terminating of both the Gateway and Workstation as simple as possible. It is still very much in the early stages of its development, which is part of the reason for its rather basic appearance though functionally works as intended. By pressing the “Start Whonix Button”, both the Gateway and Workstation are launched and by pressing the “Stop Whonix Button” they are terminated. While Whonix is being used, the window prevents itself from being closed, as to prevent issues.

If you’d like to try the UI with your existing installation of Whonix, you may simply drag-and-drop it into the folder in which you’ve installed VirtualBox.

Download Links:

The Whonix-Installer may be downloaded from here:

The Whonix-UI can be found separately here:

Posted in Testers wanted!, Whonix Development News Tagged with: , , ,

Whonix featured on Tor blog

Posted in Whonix Misc News

Whonix stable upgrade released!


Either start with fresh templates. I.e. uninstall qubes-template-whonix-gw and qubes-template-whonix-ws. Then, to install, run in dom0:

sudo qubes-dom0-update --enablerepo=qubes-tempates-community qubes-template-whonix-gw qubes-template-whonix-ws

Or you can also upgrade from Whonix’s repository. Please refer to the following instructions:


Or you can also upgrade from Whonix’s repository. Please refer to the following instructions:

major Whonix 13 -> changes:

Posted in Whonix Important News

How to upgrade Debian, Whonix, etc. without being compromised by CVE-2016-1252


Posted in Whonix Important News

Qubes-Whonix DisposableVM documentation created

Before we had just a stub. Now Qubes-Whonix DisposableVMs are fully documented thanks to contributions by the community. (wiki history)

What are DisposableVMs?

Under the Qubes TemplateVM model, any changes made to a TemplateBasedVM’s root filesystem are lost upon reboot. This is advantageous for several reasons: it allows centralized (and therefore faster) updates for all applications (most) inside the root filesystem, saves time and disk space.

However, certain directories are designed to persist between reboots in order to store files and settings. These directories are stored in /rw/ and include /home/user as well as additional directories defined by “bind directory” settings.

To ensure that all changes to the filesystem are discarded after a session, Qubes offers DisposableVMs. When a DisposableVM is shutdown, the VM is removed from Qubes and all related VM images are deleted from the host filesystem.

What is a Whonix-Workstation DisposableVM?

As the name suggests, this is a Qubes DisposableVM template based on the Whonix-Workstation. This allows Qubes-Whonix users to create throw-away instances of their Whonix-Workstation.

Why Should I Consider Using a Whonix-Workstation DisposableVM?

Whonix-Workstation DisposableVMs:

  • Are quickly generated;
  • Are disposed of (deleted) when the user has finished browsing and other activities in a single session; and
  • Will not remember any of the user’s activities across DisposableVM sessions, unless customized.

The major benefit of this approach is that the Whonix-Workstation DisposableVM can be created in order to host a single application – usually the Tor Browser – mitigating the risk that a compromise of the browser will affect any of your other VMs.

Critically, a Tor Browser exploit will not affect (poison) later instances of the Tor Browser running in a subsequent DisposableVM session, because the DisposableVM is always started in its original state.

Can I Customize Whonix-Workstation DisposableVMs?

Yes. For advanced users, the instructions include steps to create a customized savefile that will remember specific changes, such as personalized Tor Browser settings. Due to concerns over possible fingerprinting issues, users should carefully read the wiki warnings before proceeding on this course of action.

Can I Easily Add DisposableVM Entries to the Qubes Menu?

Not yet for Qubes R3.2 XFCE 4, but you can edit existing DispVM start menu entries and desktop shortcuts can be created.

What Else Should I Know?

Due to a few usability issues affecting anonymity, do not use Whonix-Workstation DisposableVMs until:

  • You understand Whonix-WS DispoableVMs are NOT yet amnesic; and
  • Have carefully read and understood the available Qubes-Whonix DisposableVM documentation.

Alternatively, you may wish to wait for Qubes 4.0 before you start using Qubes DisposableVMs, due to significant enhancements planned for the later release.

This blog post was written by torjunkie.

Posted in Qubes-Whonix News, Whonix Wiki Updates

don’t apt-get dist-upgrade for now – wait for workaround – CVE-2016-1252

Update, see:


Short: Don’t ‘apt-get dist-upgrade’ for now until a workaround was published

We are currently discussing this Debian apt-get security issue.

This blog post will later be updated. Another security advisory blog post will be published later.

Posted in Whonix Important News

Testers Wanted! Tor – Stable Upgrades

Tor was updated to in Whonix stable-proposed-updates as well as in testers repository.

Instructions for changing Whonix repository:

Then just do a update:

Posted in Uncategorized