Author: Patrick Schleizer
Patrick started developing Whonix, the Anonymous Operating System in 2012, when quickly others joined efforts. He collected experiences working pseudonymous on Whonix for two years, enjoys collaboratively working on privacy preserving software.

Tor 0.2.9.9-1~d80.jessie+1 Stable Upgrade – Testers Wanted!

Tor was updated to 0.2.9.9-1~d80.jessie+1 in Whonix stable-proposed-updates as well as in testers repository. Instructions for changing Whonix repository: https://www.whonix.org/wiki/Whonix-APT-Repository Then just do a update: https://www.whonix.org/wiki/Update

Whonix featured on Tor blog

https://blog.torproject.org/blog/tor-heart-whonix Read about @whonix, based on Tor: https://t.co/dinTGsBqCY Please donate to Tor, at the <3 of Internet freedom: https://t.co/yWzRLU4y7c pic.twitter.com/92bbgwXvzb — torproject (@torproject) December 27, 2016

Whonix 13.0.0.1.4 stable upgrade released!

Qubes-Whonix: Either start with fresh templates. I.e. uninstall qubes-template-whonix-gw and qubes-template-whonix-ws. Then, to install, run in dom0: sudo qubes-dom0-update –enablerepo=qubes-tempates-community qubes-template-whonix-gw qubes-template-whonix-ws Or you can also upgrade from Whonix’s repository. Please refer to the following instructions: https://www.whonix.org/wiki/Qubes/Update Non-Qubes-Whonix: https://www.whonix.org/wiki/Download Or

How to upgrade Debian, Whonix, etc. without being compromised by CVE-2016-1252

See: https://www.whonix.org/wiki/CVE-2016-1252

Qubes-Whonix DisposableVM documentation created

Before we had just a stub. Now Qubes-Whonix DisposableVMs are fully documented thanks to contributions by the community. (wiki history) What are DisposableVMs? Under the Qubes TemplateVM model, any changes made to a TemplateBasedVM’s root filesystem are lost upon reboot.

don’t apt-get dist-upgrade for now – wait for workaround – CVE-2016-1252

Update, see: * https://www.whonix.org/wiki/CVE-2016-1252 * https://forums.whonix.org/t/how-to-upgrade-debian-whonix-etc-without-being-compromised-by-cve-2016-1252 Short: Don’t ‘apt-get dist-upgrade’ for now until a workaround was published We are currently discussing this Debian apt-get security issue. https://forums.whonix.org/t/apt-get-upgrading-security-issue-cve-2016-1252 https://github.com/QubesOS/qubes-issues/issues/2520 This blog post will later be updated. Another security advisory blog post

Testers Wanted! Tor – Stable Upgrades

Tor was updated to 0.2.8.10 in Whonix stable-proposed-updates as well as in testers repository. Instructions for changing Whonix repository: https://www.whonix.org/wiki/Whonix-APT-Repository Then just do a update: https://www.whonix.org/wiki/Update

accessibility tools could be automatically removed / you probably should remove them

If you do not use any accessibility tools (gnome-orca, espeakup, console-braille, florence, dasher, kdeaccessibility, kvkbd, kmousetool, kmag, kmouth, jovie, xbrlapi, festival, qt-at-sp), you will not miss anything. (You would probably know if you are using them.) Soon, there will be

riseup.net likely compromised

riseup.net is a popular service provider among privacy and activist circles tweeted an obscure reference about birds which likely refers to their warrant canary that hasn’t been renewed since August. listen to the hummingbird, whose wings you cannot see, listen

Tor / whonixcheck Stable Upgrades – Testers Wanted!

Tor was updated to 0.2.8.9-1~d80.jessie+1 and whonixcheck was updated to 3:4.6.4-1 in Whonix stable-proposed-updates as well as in testers repository. Tor 0.2.8.9 is released, with important fixes whonixcheck fixes the /etc/perl/sitecustomize.pl apparmor warning Instructions for chaneing Whonix repository: https://www.whonix.org/wiki/Whonix-APT-Repository Then

Top