Category: Whonix Wiki Updates

When significant changes to the Whonix wiki are made with knew knowledge you should be aware off, we will blog about it.

What’s in a Nym?

I’ve recently taken to documenting and simplifying the steps for using Mixmaster with Nymservers – a setup that allows sending and receiving email pseudonymously without reliance on a service provider. Mixmaster comes with Whonix. Feel free to give it a

New chapter Vulnerabilities at Install Time in Advanced Security Guide

Latest stable releases sometimes contain vulnerable, remotely exploitable applications that are very likely to be used over untrusted networks that are in a position to run man-in-the-middle attacks. A new chapter “Vulnerabilities at Install Time” has been added to the

OnionCat – tunnel TCP, UDP, ICMP, IPv6 or else Tor / i2p by using TAP/TUN tunneling device

OnionCatĀ can tunnel TCP, UDP, ICMP,Ā IPv6 or any other protocol through Tor or i2p by creating a TAP/TUN tunneling device. It is a much underrated, neglected tool. It can also be used in Whonix. Documentation on using OnionCat has been updated:

Documentation index layout improved

lasko prettied up Whonix’s Documentation index page. Check it out: https://www.whonix.org/wiki/Documentation Thank you, lasko!

Contribute page updated

lasko prettied up Whonix’s contribute page. Check it out: https://www.whonix.org/wiki/Contribute Thank you, lasko!

Backup Whonix VMs – new wiki page

A new wiki page on how to backup your Whonix VMs has been written. You can find it here: https://www.whonix.org/wiki/Backup_Whonix_VMs

Other Desktop Environments (New Wiki Entry)

Downloadable Whonix versions come with KDE installed by default. It is possible to uninstall KDE, although doing so is a bit difficult, especially if you want to uninstall all of it and/or to to use a CLI version and/or to

Air Gapped OpenPGP Key (New Wiki Entry)

It is recommended to first quickly read this article from top to bottom without taking actions. After you roughly understood how it’s supposed to work, re-read this page and do it step-by-step. Exercise this with test keys first. If that

The OpenPGP Web of Trust (Updated Wiki Entry)

If you want to be extra cautious and really authenticate a OpenPGP key in a stronger way than what standard HTTPS offers you, you could use the OpenPGP Web of Trust. One of the inherent problems of standard HTTPS is

Bootstrapping OpenPGP keys from the web (updated wiki chapter)

What in case you want to totally stay anonymous or have no trust path to a OpenPGP key? Some people just write an unencrypted mail to the recipient and ask them to send their public key. The recipient will most

Top