Author: Patrick Schleizer

Patrick started developing Whonix, the Anonymous Operating System in 2012, when quickly others joined efforts. He collected experiences working pseudonymous on Whonix for two years, enjoys collaboratively working on privacy preserving software.

Hiring: Linux Distribution Developers!

Whonix has found a sponsor. Details will be announced later. We are hiring Linux Distribution Developers! – programming / scripting skills – Any or multiple of the following languages: linux shell scripting, python, C, C++, perhaps others – git Bonus,

Overview of Libre Software related Mobile Projects

Rough overview. Some notes. Please contribute to the overview. See: https://www.whonix.org/wiki/Dev/mobile

RAM Encryption?

There is PrivateCore vCage. Couldn’t find much information at their website. Seems like a commercial product. Would wonder about the prices out of curiosity. Are there any other competition products? Or even Libre Software / Open Source ones? The closest

Tor 0.2.9.10-1~d80.jessie+1 Stable Upgrade – Testers Wanted!

Updated Tor was uploaded to Whonix stable-proposed-updates as well as to testers repository. Instructions for changing Whonix repository: https://www.whonix.org/wiki/Whonix-APT-Repository Then just do a update: https://www.whonix.org/wiki/Update

Tor 0.2.9.9-1~d80.jessie+1 Stable Upgrade – Testers Wanted!

Tor was updated to 0.2.9.9-1~d80.jessie+1 in Whonix stable-proposed-updates as well as in testers repository. Instructions for changing Whonix repository: https://www.whonix.org/wiki/Whonix-APT-Repository Then just do a update: https://www.whonix.org/wiki/Update

Whonix featured on Tor blog

https://blog.torproject.org/blog/tor-heart-whonix Read about @whonix, based on Tor: https://t.co/dinTGsBqCY Please donate to Tor, at the <3 of Internet freedom: https://t.co/yWzRLU4y7c pic.twitter.com/92bbgwXvzb — torproject (@torproject) December 27, 2016

Whonix 13.0.0.1.4 stable upgrade released!

Qubes-Whonix: Either start with fresh templates. I.e. uninstall qubes-template-whonix-gw and qubes-template-whonix-ws. Then, to install, run in dom0: sudo qubes-dom0-update –enablerepo=qubes-tempates-community qubes-template-whonix-gw qubes-template-whonix-ws Or you can also upgrade from Whonix’s repository. Please refer to the following instructions: https://www.whonix.org/wiki/Qubes/Update Non-Qubes-Whonix: https://www.whonix.org/wiki/Download Or

How to upgrade Debian, Whonix, etc. without being compromised by CVE-2016-1252

See: https://www.whonix.org/wiki/CVE-2016-1252

Qubes-Whonix DisposableVM documentation created

Before we had just a stub. Now Qubes-Whonix DisposableVMs are fully documented thanks to contributions by the community. (wiki history) What are DisposableVMs? Under the Qubes TemplateVM model, any changes made to a TemplateBasedVM’s root filesystem are lost upon reboot.

don’t apt-get dist-upgrade for now – wait for workaround – CVE-2016-1252

Update, see: * https://www.whonix.org/wiki/CVE-2016-1252 * https://forums.whonix.org/t/how-to-upgrade-debian-whonix-etc-without-being-compromised-by-cve-2016-1252 Short: Don’t ‘apt-get dist-upgrade’ for now until a workaround was published We are currently discussing this Debian apt-get security issue. https://forums.whonix.org/t/apt-get-upgrading-security-issue-cve-2016-1252 https://github.com/QubesOS/qubes-issues/issues/2520 This blog post will later be updated. Another security advisory blog post

Top