New chapter Vulnerabilities at Install Time in Advanced Security Guide

Latest stable releases sometimes contain vulnerable, remotely exploitable applications that are very likely to be used over untrusted networks that are in a position to run man-in-the-middle attacks.

A new chapter “Vulnerabilities at Install Time” has been added to the Advanced Security Guide that discusses this issue in detail.

Please help research and document sane and effective solutions.


Thanks to Jason Ayala for revising that chapter!

Patrick started developing Whonix, the Anonymous Operating System in 2012, when quickly others joined efforts. He collected experiences working pseudonymous on Whonix for two years, enjoys collaboratively working on privacy preserving software.