Basic Security Guide Introduction
If users are unfamiliar with Whonix / Linux or have limited knowledge of computer security and anonymity topics, then it is recommended to first read these resources:
- Do Not: non-technical steps for staying anonymous
- Computer Security Education
- Post Installation Advice
- Surfing Posting Blogging
- Read the Documentation extensively.
This Motivation section may be skipped.
If you need motivation to secure your computer, refer to these articles:
- The Scrap Value of a Hacked PC, Revisited (blog post).
- The Value of a Hacked Email Account (blog post).
If the reader is time-poor, then just review the relevant images:
Advanced Security Guide
After reading this chapter, users are recommended to refer to the Advanced Security Guide for even more security advice.
It is recommended that users read the latest Whonix news to stay in touch with ongoing developments, such as notifications about important security vulnerabilities, improved Whonix releases, and other advice.
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! See Conditions for Contributions to Whonix, then Edit! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.