Author: HulaHoop

A Picture is Worth More than a Thousand Informants

Anonymous blogging and journalism is becoming ever complicated in the age of mass surveillance and data mining. I want to draw the attention of our publishing users to the fact that every photo and video shot with a camera carries

Download Page Changes

The Whonix download page was recently updated to reflect the supported platforms that have been available for some time. Please check it out: https://www.whonix.org/wiki/Download#Landing

Documentation Updates

The documentation on the wiki saw many changes lately. Thanks to all who contributed. Changelog: https://www.whonix.org/wiki/KVM https://www.whonix.org/wiki/KVM/Installation_Screenshots https://www.whonix.org/wiki/VoIP https://www.whonix.org/wiki/Hidden_Services_Guides https://www.whonix.org/wiki/Hidden_Services#Hidden_Service_Authentication https://www.whonix.org/wiki/Tor_Browser#Local_Connections https://www.whonix.org/wiki/Tunnel_Proxy_or_SSH_or_VPN_through_Tor#Tor_Browser_Proxy_Configuration https://www.whonix.org/wiki/Whonix_Signing_Key#Download_the_key https://www.whonix.org/wiki/Install_Software https://www.whonix.org/wiki/Warning#Avoid_non-Free_Software https://www.whonix.org/wiki/Warning#Avoid_Unsigned_Software https://www.whonix.org/wiki/Tor https://www.whonix.org/wiki/Comparison_Of_Tor_with_CGI_Proxies,_Proxy_Chains,_and_VPN_Services#Comparison_of_Tor_and_VPN_services https://www.whonix.org/wiki/E-Mail#Icedove_.28Mozilla_Thunderbird.29_with_Enigmail_.2B_TorBirdy https://www.whonix.org/wiki/Mixmaster#Nymserver_How-To https://www.whonix.org/wiki/OnionCat https://www.whonix.org/wiki/I2P https://www.whonix.org/wiki/YaCy

What’s in a Nym?

I’ve recently taken to documenting and simplifying the steps for using Mixmaster with Nymservers – a setup that allows sending and receiving email pseudonymously without reliance on a service provider. Mixmaster comes with Whonix. Feel free to give it a

The Cold Hard Truth Behind VPNs

The “Virtual” in Virtual Private Networks is just that: “Existing in the mind, especially as a product of the imagination.” There is an entire market of scam artists playing on people’s fears of mass surveillance, and trying to sell them

If-by-Surveillance

My friends, I had not intended to discuss this controversial subject at this particular time. However, I want you to know that I do not shun controversy. On the contrary, I will take a stand on any issue at any

TorProject Leaflets

For those of you who are introducing Tor for the first time to friends and family, the TorProject has released their official leaflets for advocacy to better explain anonymity technology and its uses. https://blog.torproject.org/blog/spread-word-about-tor

Poisoned Fruit

https://firstlook.org/theintercept/2015/03/10/ispy-cia-campaign-steal-apples-secrets/ The classic paper on compilers called “Trusting Trust” sheds light on the most devastating type of attacks in a computing environment. An attacker altering a compiler binary can make it produce malicious versions of every program it compiles, including

The ‘Libre’ in Libre Software

For those of you using proprietary platforms, powerful privacy tools may be your first encounter with Libre Software. Unlike proprietary software, Libre Software is not some opaque mysterious blackbox, a shrink wrapped “product” or even a development process. Libre Software

Whonix KVM is Back!

After a brief hiatus I am retaking up maintenance of KVM Whonix. Feel free to leave comments or raise support concerns in the dedicated sub-forum.

Top