- 1 Current Maintainers
- 2 Past Contributors
- 3 Credits, Inspiration, Alternatives, Sources
- 4 Whonix History
- 5 License
- 6 Footnotes
Credits, Inspiration, Alternatives, Sources
The success of the Whonix platform is the sum total of several factors:
- The solid foundation at its heart - the Debian GNU/Linux distribution.
- The software provided by several other projects (like Tor and Qubes) and the tireless efforts of their many developers and maintainers. 
- Lessons learned from:
- Expert advice provided in various Internet forums and attendance at software development events.
- Previous failures and successes in the Whonix development cycle.
- The failures and successes of similar anonymity projects (like Tails).
- Inspiration drawn from other projects, leading to the implementation of new or improved anonymity / security features.
- Direct contributions by the Whonix community.
In alphabetical order, the following projects or sources have had the greatest influence on Whonix development to date:
- Debian GNU/Linux
- Mailing lists:
- The Tor Project
- Ubuntu GNU/Linux
Anonymity and Security Development
In alphabetical order, the following projects have significantly influenced developer thinking about anonymity networks and threat modelling:
Over the lifetime of the Whonix project, development has been informed by thousands of external resources. For the reader's interest, a very small sample of older sources is listed here. Numerous updated sources can be found in developer documentation footnotes.
There are a number of projects that share security and anonymity goals with Whonix. The reference list below captures a number of influential projects that have interesting proposals, security enhancements, desirable features, and so on.  The intent is for any useful developments to be (potentially) ported to Whonix, as has occurred in the past.
- Tails: A live CD / USB distribution which is preconfigured to use Tor safely. 
- PELD: Tails specification and implementation.
- A Tor Virtual Machine Design and Implementation: Tor Project design documents.
- TorVM for Qubes: (qubes-tor).
- VM basierende Anonymisierung: Unsophisticated German instructions on anonymizing VMs.
- Onion Service Setup Guide for Newbies (Version .2): A how-to on setting up a hidden (onion) service safely.
- VMWare Through Tor: Forcing Tor to proxy connections from inside the VMWare browser application.
- Broken links: Tor Onion Service Server in a box -- Tor Onion Service VM and "My Hidden Blog" - Hosting Tutorial.
Networking and Firewalls
- Tor and the DreamPlug: Similar networking / firewall design to Whonix.
- Tor and OpenWRT: Similar networking / firewall design to Whonix.
Tor Bridges and Relays
- Torouter: Alpha software to easily build a bridge or relay by default.
- Another TorVM: A contribution by unknown authors, with a site that imitates the official Tor one. 
- Tor Project Transparent Proxy: Now outdated, but it offers: transparent anonymizing traffic for a specific user; local redirection through Tor; an anonymizing middlebox; and local redirection and an anonymizing middlebox.  
- Transocksifying Tor: This method to use a different firewall with DNT is now outdated, since it was only needed when Tor did not natively support TransPort.
- Old instructions from board.gulli.com: Complicated German instructions to utilize TransPort back when it was not natively supported by Tor.
A brief history of the founding of Whonix can be found here.
Third Party Image Contributions
The Whonix website and documentation is enriched by a number of images and icons generously provided by third parties. Appreciation is expressed to those contributors who have placed their images in the public domain, or specifically designed images for Whonix. 
Third Party Permissions
See the page footer.
See the license file in Whonix source code.
- Which form part of the core anonymity and security features in Whonix.
- See Dev/Tails Doc Fork for a list of documentation pages which have been forked by Patrick Schleizer.
- Including those that have directly affected prior Whonix development, or made mistakes in either their design or implementation.
- Tails is listed on https://www.torproject.org. The design documents describe the Tor enforcement mechanisms.
- Isolation is not enforced between client applications using Tor, and it has infrequent security releases.
- Qubes focuses on security through isolation based on virtualization. The actual implementation was left to the user at that time.
- This was deprecated long ago. A few of those reasons listed in the link (not to use some other projects) are equally applicable here.
- This behavior raises questions about the possible motives of the developers.
- The configuration closest to Whonix is the anonymizing middlebox (Whonix is an isolating proxy).
- The guide also notes: "See Whonix for a complete, ready-made VM based solution (alternatively using multiple physical computers) built around the Isolating Proxy and Transparent Proxy Anonymizing Middlebox design."
- TorBOX was later renamed to Whonix.
- The source code can be viewed here.
- Please add your contribution to the third party images page if it is not already listed.
- Broken link: https://anonymous-proxy-servers.net/forum/viewtopic.php?f=9&t=7183
- Broken link: http://forum.dee.su/#Topic/65650000000234021
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! See Conditions for Contributions to Whonix, then Edit! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.