Credits, Inspiration, Alternatives, Sources
The success of the Whonix ™ platform is the sum total of several factors:
- The solid foundation at its heart - the Debian GNU/Linux distribution.
- The software provided by several other projects (like Tor and Qubes) and the tireless efforts of their many developers and contributors. 
- Lessons learned from:
- Expert advice provided in various Internet forums and attendance at software development events.
- Previous failures and successes in the Whonix ™ development cycle.
- The failures and successes of similar anonymity projects (like Tails).
- Inspiration drawn from other projects, leading to the implementation of new or improved anonymity / security features.
- Direct contributions by the Whonix ™ community.
Whonix ™ Development
In alphabetical order, the following projects or sources have had the greatest influence on Whonix ™ development to date:
Anonymity and Security Development
In alphabetical order, the following projects have significantly influenced developer thinking about anonymity networks and threat modelling:
Over the lifetime of the Whonix ™ project, development has been informed by thousands of external resources. For the reader's interest, a very small sample of older sources is listed here. Numerous updated sources can be found in developer documentation footnotes.
There are a number of projects that share security and anonymity goals with Whonix ™. The reference list below captures a number of influential projects that have interesting proposals, security enhancements, desirable features and so on.  The intent is for any useful developments to be (potentially) ported to Whonix ™, as has occurred in the past.
- Tails: A live CD / USB distribution which is preconfigured to use Tor safely. 
- PELD: Tails specification and implementation.
- A Tor Virtual Machine Design and Implementation: Tor Project design documents.
- Liberté Linux: A live CD based on hardened Gentoo. 
- Qubes-Whonix ™: This blog post provided the first hints on integrating Whonix ™ into Qubes. 
- TorVM for Qubes: (qubes-tor).
- VM basierende Anonymisierung: Unsophisticated German instructions on anonymizing VMs.
- Onion Service Setup Guide for Newbies (Version .2): A how-to on setting up a hidden (onion) service safely.
- VMWare Through Tor: Forcing Tor to proxy connections from inside the VMWare browser application.
- Broken links:
Networking and Firewalls
- Tor and the DreamPlug: Similar networking / firewall design to Whonix ™.
- Tor and OpenWRT: Similar networking / firewall design to Whonix ™.
Tor Bridges and Relays
- Torouter: Alpha software to easily build a bridge or relay by default.
- Running an OpenBSD Tor Relay: See Part 1 and Part 2 (unreviewed).
- JanusVM. 
- TorVM: From the same authors as JanusVM, this project is also deprecated.
- Another TorVM: A contribution by unknown authors, with a site that imitates the official Tor one. 
- Tor Project Transparent Proxy: Now outdated, but it offers: transparent anonymizing traffic for a specific user; local redirection through Tor; an anonymizing middlebox; and local redirection and an anonymizing middlebox.  
- Transocksifying Tor: This method to use a different firewall with DNT is now outdated, since it was only needed when Tor did not natively support TransPort.
- TorVPN: The abandoned and unfinished predecessor to TorBOX. 
- Old instructions from board.gulli.com: Complicated German instructions to utilize TransPort back when it was not natively supported by Tor.
- Easy and secure anonymous internet usage by ra (an anonymous author). 
Whonix ™ History
A brief history of the founding of Whonix ™ can be read here.
Third Party Image Contributions
The Whonix ™ website and documentation is enriched by a number of images and icons generously provided by third parties. Appreciation is expressed to those contributors who have placed their images in the public domain or specifically designed images for Whonix ™. 
Third Party Permissions
See the page footer.
Whonix ™ License
See the license file in Whonix ™ source code.
- Which form part of the core anonymity and security features in Whonix ™.
- See Dev/Tails Doc Fork for a list of documentation pages which have been forked by Patrick Schleizer.
- This list includes projects that have directly affected prior Whonix ™ development or those who made mistakes in either their design or implementation, which Whonix ™ developers learnt from.
- Tails is listed on https://www.torproject.org. The design documents describe the Tor enforcement mechanisms.
- Isolation is not enforced between client applications using Tor, and it has infrequent security releases.
- Qubes focuses on security through isolation based on virtualization. The actual implementation was left to the user at that time.
- Formerly hosted at http://lotjbov3gzzf23hc.onion/hostingtutorial/
- Formerly hosted at https://www.czeskis.com/random/tor-hidden-service-vm.html
- This was deprecated long ago. A few of those reasons listed in the link (not to use some other projects) are equally applicable here.
- This behavior raises questions about the possible motives of the developers.
- The configuration closest to Whonix ™ is the anonymizing middlebox (Whonix ™ is an isolating proxy).
- The guide also notes: "See Whonix ™ for a complete, ready-made VM based solution (alternatively using multiple physical computers) built around the Isolating Proxy and Transparent Proxy Anonymizing Middlebox design."
- TorBOX was later renamed to Whonix ™.
- The source code can be viewed here.
- Please add your contribution to the third party images page if it is not already listed.
- Broken link: https://anonymous-proxy-servers.net/forum/viewtopic.php?f=9&t=7183
- broken link: http://forum.dee.su/#Topic/65650000000234021