Basic Security Guide Introduction
If users are unfamiliar with Whonix / Linux or have limited knowledge of computer security and anonymity topics, then it is recommended to first read these resources:
- The Computer Security Education section
- Do Not: Non-technical Steps for Staying Anonymous
- Post-installation Security Advice
- Surfing, Posting and Blogging
If users have the time available, it is recommended to read the Documentation broadly.
This Motivation section may be skipped.
If you need motivation to secure your computer, refer to these articles:
- The Scrap Value of a Hacked PC, Revisited (blog post).
- The Value of a Hacked Email Account (blog post).
If the reader is time-poor, then just review the relevant images:
Advanced Security Guide
After reading this chapter, users are recommended to refer to the Advanced Security Guide section for even more security advice.
It is recommended that users read the latest Whonix news to stay in touch with ongoing developments, such as notifications about important security vulnerabilities, improved Whonix releases, other software updates and additional advice.
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! See Conditions for Contributions to Whonix, then Edit! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.