A Greek Tragedy

For years its been known that shortly after the 2004 Olympic games in Athens a wiretapping operation against the Greek parliament was busted. There was no public information on who was behind it. Thanks to a recently published article based on the Snowden disclosures, the loose ends are finally tied.

Interesting points that jumped out from the story:

* Most of the international information accesses are under the guise of information sharing with “allies” or “friends”. A state somewhere hopes to benefit from the NSA’s equipment to spy on their own people and political targets in return for sharing data. They believe these agreements exempt their own government from being a target but they don’t realize the NSA has no friends, only targets – easy and hard ones.

* They invoked the terrorist meme to convince client states to cooperate. Nothing new here except one would think politicians would be a little smarter and see through this because they use it on people all the time. Apparently not.

* There is some serious rivalry between US Intelligence Agencies. Each acts as it’s own independent fiefdom competing for influence and funding. The NSA considers themselves on the apex of information gathering unaccountable to no one, not even their CIA partners.

* Global Telecom Corporations are a great umbrella for espionage activities. Even when it was clear what’s going on, they covered up for them.

* If you are a custodian for a network they want to access, they will crack you or whack you and make it look like an accident.

* Lawful Intercept backdoors in communications is a massive hole that let’s everyone in indiscriminately. It doesn’t matter if we call it a golden key or platinum trapdoor.

* This is the first time an “allied” state issues an arrest warrant for an American intelligence operative, bucking the trend of their cuckolded European neighbors.

Posted in Uncategorized

A Picture is Worth More than a Thousand Informants

Anonymous blogging and journalism is becoming ever complicated in the age of mass surveillance and data mining. I want to draw the attention of our publishing users to the fact that every photo and video shot with a camera carries its sensor’s unique fingerprint and unlike regular digital file metadata, there is no practical software to clean up this type of identifier. This links the data you share back to you or your source even, if you publish them from behind Tor.

Its not an unsurmountable problem. Provided you religiously follow the updated operational security guidelines posted on the wiki, you should be able to safely share your facts with the world.

Stay safe. Stay free.

Posted in Uncategorized

Whonix Anonymous Operating System Version 11 Released!

Whonix is an operating system focused on anonymity, privacy and security. It’s based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user’s real IP.

Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call Whonix-Gateway. The other, which we call Whonix-Workstation, is on a completely isolated network. Only connections through Tor are possible.

Whonix for Qubes


Whonix for KVM


Whonix for VirtualBox


If you want to upgrade existing Whonix version using Whonix’s APT repository

Special instructions required:

Edit 1: There will be no more support for upgrading Whonix 10 to Whonix 11 after October 17 2015.

If you want to upgrade existing Whonix version from source code

See https://www.whonix.org/wiki/Dev/BuildDocumentation.

If you want to build images from source code

See https://www.whonix.org/wiki/Dev/BuildDocumentation.

Call for Help

– If you know javascript, python, shell scripting (/bin/bash) and/or linux sysadmin, please join us!
– Contribute: https://www.whonix.org/wiki/Contribute
– Donate: https://www.whonix.org/wiki/Donate

Changelog between Whonix 10 and Whonix 11

See following two blog posts that were calls for testing, these contain the changelogs. Whonix has been blessed stable and released as Whonix 11.


Forum Discussion:


Posted in Important

Security Advisory: Firefox exploit found in the wild

You are advices to set configure the following setting in Tor Browser in Whonix:
Edit -> Preferences -> Applications ->Portable Document Format (PDF) -> Save File

You are advices to update as soon as updates are available. This blog post will be updated as new information come in.

(Do that same with Firefox / Iceweasel if you are using that elsewhere.)

Problem description at Mozilla Firefox blog:

Impact in Whonix:
– Unless you were using AppArmor, local files within the VM would be accessible.

Vulnerable browsers:
Tor Browser
– Firefox
– Iceweasel

Tor Browser upstream Bug report:

Whonix forum discussion:

Posted in Important

Download Page Changes

The Whonix download page was recently updated to reflect the supported platforms that have been available for some time.

Please check it out:


Posted in Website, Wiki-Updates





Would you like to contribute to the Whonix project?

Contributing can be as easy as sharing the blog over social media, volunteering, or making a monetary donation.

For more ideas on how to get involved see the "Contribute" and "Testers-Wanted" categories.


- Whonix Staff