Build Anonymity

From Whonix

< Dev(Redirected from Build Anonymity)


Build Anonymity[edit]

This does only apply, if you are going to build Whonix ™ from source, and/or if you are going to redistribute Whonix ™ and/or if you are going to use Physical Isolation. This is not a Whonix ™ specific problem. Most projects do not even have a chapter about build anonymity. While building Whonix ™, software has to be downloaded. It is a unique selection of software and there is no way to make it non-unique. Therefore your internet service provider (ISP) could guess, that you are building Whonix ™. This should not be of any concern in a free country (free by your own definition), if the content of your traffic is not being observed or logged.

Especially, but not exclusively, in case you want to redistribute Whonix ™, you might be interested to hide the fact, you are building Whonix ™ (i.e. you want to stay anonymous).

To prevent any kind of personally identifiable or even fingerprintable information leaking from the build system into the Whonix ™ images, it is recommended to build inside of an already torified Virtual Machine. [1] [2] You can build Whonix ™ inside an existing Whonix-Workstation ™, but it can also be built on a headless server.

It is also recommended to build in an already torified Virtual Machine, because that prevents leaks from the build system, which could help an attacker (with root access to the Whonix-Workstation ™), to gather identifiable information about that build system, that could ultimately lead back to your identity.

Beginning with Whonix ™ 0.4.0, grml-debootstrap and chroot is being used for virtual machine image creation. The grml-debootstrap source code tells, that it copies /etc/network/interfaces and /etc/resolv.conf into the chroot. grml-debootstrap also mounts a lot devices (/dev, /proc etc.) inside the chroot and later Whonix ™ chroot also mounts some devices. That's why it is recommended to build inside an already torified virtual machine.

Building from source code naturally also leaves local traces on the disk, such as the source code itself and build dependencies. If that is of concern to you, it can be more easily disposed, when it is contained in a Virtual Machine.

It would also be possible to build directly on the host and torify all connections the scripts make, but it is unknown what other grml-debootstrap/chroot related leaks there might be.

It is a known issue the build anonymity requires building inside a VM.

VirtualBox inside VirtualBox[edit]

See Nested Virtualization.


corridor, a Tor traffic whitelisting gateway [archive] might be useful. See also discussion on the tor-talk mailing list [archive].


  1. Yes, this creates a bootstrap, chicken or egg problem. To solve it you can either download already existing Whonix ™ binary builds or if you prefer to build from source, build a minimal torified machine yourself first while running any network traffic over Tor. Any help required with that? Contact us. See also Manually Creating Whonix ™.
  2. Whonix ™ build process attempts to not leak anything (such as /etc/resolv.conf) from the host system into the VM image since that would also a bug hindering the implementation of reproducible builds [archive]. However, in software nothing can be guaranteed with absolute certainty. By using a VM, this risk is minimized.

Fosshost is sponsors Kicksecure ™ stage server Whonix old logo.png
Fosshost About Advertisements

Search engines: YaCy | Qwant | ecosia | MetaGer | peekier | Whonix ™ Wiki

Follow: 1024px-Telegram 2019 Logo.svg.png Iconfinder Apple Mail 2697658.png Twitter.png Facebook.png Rss.png Reddit.jpg 200px-Mastodon Logotype (Simple).svg.png

Support: 1024px-Telegram 2019 Logo.svg.png Discourse logo.png Matrix logo.svg.png

Donate: Donate Bank Wire Paypal Bitcoin accepted here Monero accepted here Contriute

Whonix donate bitcoin.png Monero donate Whonix.png United Federation of Planets 1000px.png

Twitter-share-button.png Facebook-share-button.png Telegram-share.png link=mailto:?subject=Dev/Build Anonymity&body= link= Anonymity link= Anonymity link= Anonymity%20 Anonymity

Interested in becoming an author for the Whonix ™ News Blog or writing about anonymity, privacy and security? Please get in touch!

https link onion link Priority Support | Investors | Professional Support

Whonix | © ENCRYPTED SUPPORT LP | Heckert gnu.big.png Freedom Software / Osi standard logo 0.png Open Source (Why?)

The personal opinions of moderators or contributors to the Whonix ™ project do not represent the project as a whole.

By using our website, you acknowledge that you have read, understood and agreed to our Privacy Policy, Cookie Policy, Terms of Service, and E-Sign Consent.