See Electrum for introduction and warnings!
Primarily refer to Electrum! Use this page only in case newer versions of Electrum are desired!
Note: The following instructions should be applied in Whonix-Workstation ™ (Qubes-Whonix ™:
1. Open a terminal.
If you are using Qubes-Whonix ™, complete the following steps.
Qubes App Launcher (blue/grey "Q") →
Whonix-Workstation ™ AppVM (commonly named anon-whonix) →
If you are using a graphical Whonix with XFCE, run.
Start Menu →
2. Import the gpg public key of Electrum developer Thomas Voegtlin. 
Securely download the key.
Display the key's fingerprint.
gpg --keyid-format long --import --import-options show-only --with-fingerprint ThomasV.asc
Verify the fingerprint. Should show.
In early-2019, the output is identical to the following image.
Figure: Fingerprint Verification
pub rsa4096/2BD5824B7F9470E6 2011-06-15 [SC]
Key fingerprint = 6694 D8DE 7BE8 EE56 31BE D950 2BD5 824B 7F94 70E6
uid Thomas Voegtlin (https://electrum.org [archive]) <firstname.lastname@example.org>
uid ThomasV <email@example.com>
uid Thomas Voegtlin <firstname.lastname@example.org>
sub rsa4096/1A25C4602021CD84 2011-06-15 [E]
Do not continue if the fingerprint does not match! This risks using infected or erroneous files! The whole point of verification is to confirm file integrity.
Add the signing key.
3. Download the Electrum AppImage.
Note: At the time of writing,
electrum-3.3.8 was the latest stable release. Before starting the Electrum download, browse to electrum.org/#download [archive] to verify the correct file path. Then download the file with scurl. 
5. Check the Electrum AppImage is not corrupted after download. 
To check the Electrum AppImage, run.
The following output indicates a corrupted and/or non-existent AppImage file.
electrum-3.3.8-x86_64.AppImage: HTML document, ASCII text, with very long lines
In that case, delete the file and try downloading the AppImage again.
6. Download the corresponding gpg signature.
It is necessary to verify the integrity of the AppImage with the correct signature.
Note: If users downloaded a later Electrum version at step 4, then modify the following command to match the corresponding signature file. 
7. Verify the integrity of the AppImage image.
Note: This command must be run in the same directory as the downloaded AppImage and signature.
gpg --verify electrum-3.3.8-x86_64.AppImage.asc
If the image is verified successfully, the output will show a "Good signature" similar to the screenshot below.
Figure: Good Signature 
The above "gpg: WARNING" can be ignored since it does not alter the validity of the signature related to the downloaded key. Rather, this warning refers to the level of trust placed in the developers signing key and the web of trust. To remove this warning, the developers signing key must be personally signed with your own key.
If the following "gpg: BAD signature" message appears, the Appimage has been corrupted or altered during the download process.
Figure: Bad Signature
In this event, delete both the AppImage and signature and either wait 10-15 minutes for the Tor circuits to change, or open up the Nyx Tor Controller in Whonix-Gateway ™ (Qubes-Whonix ™:
sys-whonix) and type "n" to create new Tor circuits. Wait for a random period of time before repeating the steps to download the AppImage and signature.
8. Change file permissions.
Make the electrum AppImage executable.
chmod +x electrum-3.3.8-x86_64.AppImage
Please refer to the official Documentation at docs.electrum.org [archive] for comprehensive instructions, as well as more advanced topics like Cold Storage [archive] of private keys.
To start Electrum on all platforms, run.
Qubes-Whonix ™ users are recommended to configure a Split Bitcoin Wallet [archive] to better protect their private keys. To protect against identity correlation through Tor circuit sharing, follow the instructions below (see Stream Isolation for more information).
Electrum: First Run
1. Configure a manual server connection.
When Electrum is started for the first time, users are met with the prompt:
"How do you want to connect to a server?".
Select server manually and press
Figure: Server Setting
2. Change the proxy settings.
The necessary settings are:
Next and the application should be fully functional.
Figure: SOCKS5 Proxy Configuration
Note: If Electrum is already set up but stream isolation was not enabled, then navigate to
Network in Electrum to bring up the server and proxy settings.
This step is optional.
1. Create folder
mkdir -p ~/.local/share/applications
2. Create a new file
~/.local/share/applications/electrum.desktop using an editor.
3. Paste the following contents.
4. Save the file.
The procedure is now complete.
The launcher can be found here:
Start Menu →
After installing Electrum, please consider making a donation to Whonix ™ to keep it running for years to come.
Donate Bitcoin (BTC) to Whonix ™.
- ↑ To find the correct image download:
Copy Link Location →
to scurl command.
- ↑ Due to recent DDoS attacks.
- ↑ To find the correct signature file download:
Copy Link Location →
to scurl command
gpg: assuming signed data in 'electrum-3.3.8-x86_64.AppImage'
gpg: Signature made Thu 16 May 2019 02:14:30 PM EDT
gpg: using RSA key 6694D8DE7BE8EE5631BED9502BD5824B7F9470E6
gpg: Good signature from "Thomas Voegtlin (https://electrum.org) <email@example.com>" [unknown]
gpg: aka "ThomasV <firstname.lastname@example.org>" [unknown]
gpg: aka "Thomas Voegtlin <email@example.com>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 6694 D8DE 7BE8 EE56 31BE D950 2BD5 824B 7F94 70E6
Jobs in USA
Search engines: YaCy | Qwant | ecosia | MetaGer | peekier | Whonix ™ Wiki
Love Whonix ™ and want to help spread the word? You can start by telling your friends or posting news about Whonix ™ on your website, blog or social media.
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to Conditions for Contributions to Whonix ™, then Edit! Edits are held for moderation. Policy of Whonix Website and Whonix Chat and Policy On Nonfreedom Software applies.
Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP. Whonix ™ is a trademark. Whonix ™ is a licensee [archive] of the Open Invention Network [archive]. Unless otherwise noted, the content of this page is copyrighted and licensed under the same Freedom Software license as Whonix ™ itself. (Why?)
The personal opinions of moderators or contributors to the Whonix ™ project do not represent the project as a whole.
Whonix ™ is a derivative of and not affiliated with Debian [archive]. Debian is a registered trademark [archive] owned by Software in the Public Interest, Inc [archive].
Whonix ™ is produced independently from the Tor® [archive] anonymity software and carries no guarantee from The Tor Project [archive] about quality, suitability or anything else.