Actions

Credits and other Sources

(Redirected from Authorship)

Current Maintainers[edit]

See Team.

Past Contributors[edit]

See Team.

Credits, Inspiration, Alternatives, Sources[edit]

Introduction[edit]

The success of the Whonix platform is the sum total of several factors:

  • The solid foundation at its heart - the Debian GNU/Linux distribution.
  • The software provided by several other projects (like Tor and Qubes) and the tireless efforts of their many developers and maintainers. [1]
  • Lessons learned from:
    • Expert advice provided in various Internet forums and attendance at software development events.
    • Previous failures and successes in the Whonix development cycle.
    • The failures and successes of similar anonymity projects (like Tails).
  • Inspiration drawn from other projects, leading to the implementation of new or improved anonymity / security features.
  • Direct contributions by the Whonix community.

Credits[edit]

Whonix Development[edit]

In alphabetical order, the following projects or sources have had the greatest influence on Whonix development to date:

Anonymity and Security Development[edit]

In alphabetical order, the following projects have significantly influenced developer thinking about anonymity networks and threat modelling:

Sources[edit]

Over the lifetime of the Whonix project, development has been informed by thousands of external resources. For the reader's interest, a very small sample of older sources is listed here. Numerous updated sources can be found in developer documentation footnotes.

Similar Projects[edit]

There are a number of projects that share security and anonymity goals with Whonix. The reference list below captures a number of influential projects that have interesting proposals, security enhancements, desirable features and so on. [3] The intent is for any useful developments to be (potentially) ported to Whonix, as has occurred in the past.

Design Specifications[edit]

Miscellaneous[edit]

Networking and Firewalls[edit]

Tor Bridges and Relays[edit]

  • Torouter: Alpha software to easily build a bridge or relay by default.
  • Running an OpenBSD Tor Relay: See Part 1 and Part 2 (unreviewed).

Transparent Proxies[edit]

  • JanusVM. [7]
  • TorVM: From the same authors as JanusVM, this project is also deprecated.
  • Another TorVM: A contribution by unknown authors, with a site that imitates the official Tor one. [8]
  • Tor Project Transparent Proxy: Now outdated, but it offers: transparent anonymizing traffic for a specific user; local redirection through Tor; an anonymizing middlebox; and local redirection and an anonymizing middlebox. [9] [10]
  • Transocksifying Tor: This method to use a different firewall with DNT is now outdated, since it was only needed when Tor did not natively support TransPort.
  • TorVPN: The abandoned and unfinished predecessor to TorBOX. [11]
  • Old instructions from board.gulli.com: Complicated German instructions to utilize TransPort back when it was not natively supported by Tor.
  • Easy and secure anonymous internet usage by ra (an anonymous author). [12]

Whonix History[edit]

A brief history of the founding of Whonix can be read here.

License[edit]

Third Party Image Contributions[edit]

The Whonix website and documentation is enriched by a number of images and icons generously provided by third parties. Appreciation is expressed to those contributors who have placed their images in the public domain or specifically designed images for Whonix. [13]

Third Party Permissions[edit]

Appreciation is expressed to JonDonym and Liberté Linux for permission to use material from their websites:

Website License[edit]

See the page footer.

Whonix License[edit]

See the license file in Whonix source code.

Footnotes[edit]

  1. Which form part of the core anonymity and security features in Whonix.
  2. See Dev/Tails Doc Fork for a list of documentation pages which have been forked by Patrick Schleizer.
  3. This list includes projects that have directly affected prior Whonix development or those who made mistakes in either their design or implementation, which Whonix developers learnt from.
  4. Tails is listed on https://www.torproject.org. The design documents describe the Tor enforcement mechanisms.
  5. Isolation is not enforced between client applications using Tor, and it has infrequent security releases.
  6. Qubes focuses on security through isolation based on virtualization. The actual implementation was left to the user at that time.
  7. This was deprecated long ago. A few of those reasons listed in the link (not to use some other projects) are equally applicable here.
  8. This behavior raises questions about the possible motives of the developers.
  9. The configuration closest to Whonix is the anonymizing middlebox (Whonix is an isolating proxy).
  10. The guide also notes: "See ​Whonix for a complete, ready-made VM based solution (alternatively using multiple physical computers) built around the Isolating Proxy and Transparent Proxy Anonymizing Middlebox design."
  11. TorBOX was later renamed to Whonix.
  12. The source code can be viewed here.
  13. Please add your contribution to the third party images page if it is not already listed.
  14. Broken link: https://anonymous-proxy-servers.net/forum/viewtopic.php?f=9&t=7183
  15. Broken link: http://forum.dee.su/#Topic/65650000000234021

Random News:

Want to get involved with Whonix? Check out our Contribute page.


https | (forcing) onion

Share: Twitter | Facebook

This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! See Conditions for Contributions to Whonix, then Edit! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix is a licensee of the Open Invention Network. Unless otherwise noted, the content of this page is copyrighted and licensed under the same Libre Software license as Whonix itself. (Why?)

Whonix is provided by ENCRYPTED SUPPORT LP. See Imprint.