Mullvad Browser

From Whonix
Jump to navigation Jump to search

How to install Mullvad Browser in Whonix.

Documentation for this is incomplete. Contributions are happily considered! See this for potential alternatives.

Introduction[edit]

TODO

Installation[edit]

Kicksecure seal
Kicksecure Hardened

Redirection to Kicksecure Documentation

Incomplete: This wiki page is incomplete by design. It only includes details specific to Whonix. For full understanding, please follow the link below to the Kicksecure wiki, which provides more complete background and instructions.

  • Introduction: Whonix Documentation Introduction, User Expectations, Footnotes and References, User Expectations - What Documentation Is and What It Is Not
  • Whonix is based on Kicksecure: Whonix is built on top of Kicksecure. This means it uses many of the same security tools, design concepts, and configurations.
  • Kicksecure is based on Debian: Kicksecure is developed using Debian as its base. Debian is a widely used, stable, and free Linux operating system.
  • Inheritance: As a result, Whonix is also based on Debian.
  • Debian is GNU/Linux-based: Debian is built using the GNU/Linux operating system. GNU provides essential tools and Linux is the system’s kernel (core).
  • Shared documentation benefits: Since each system is based on the one below it, a lot of documentation and guides are shared. This reduces the need to duplicate information.
  • Inherited documentation: Most instructions and explanations are inherited from Kicksecure or Debian, unless otherwise specified.
  • Shared principles: The systems share similar security goals and setup instructions. In most cases, users can follow Kicksecure documentation when using Whonix.
  • Keep using Whonix: This does not mean users should switch to Kicksecure. This page only points to related, helpful information.
  • Where to apply the instructions: Follow the instructions inside Whonix unless specifically stated otherwise.
  • Wiki editors notice: This information is pulled from a reusable wiki template: upstream_wiki. (See which pages use this.)
  • Comparison: Whonix versus Kicksecure
  • Documentation compatibility: Because Whonix is based on Kicksecure, you can often follow Kicksecure’s instructions as long as you apply them in the right place.
  • Summary: Whonix is built on top of Kicksecure, which itself is based on Debian. Debian is a GNU/Linux operating system. This layered design means Whonix inherits many features, tools, and documentation from both Kicksecure and Debian.
  • Click here: Visit the related page in the Kicksecure wiki for full documentation and background:

  • Note: Re-interpretation...
Apply the instructions inside Whonix, not inside Kicksecure.

Kicksecure: Perform these steps inside Kicksecure.

Instead, apply the steps inside Whonix-Workstation.

Kicksecure for Qubes: Perform these steps inside Qubes kicksecure-17 Template.

Instead, use the whonix-workstation-17 Template for these steps.

Support Status[edit]

Unsupported.

Users are free to experiment with Mullvad Browser inside Whonix-Workstation but should not assume that Whonix developers have tested it in Whonix for any purpose.

Whonix Specific[edit]

General[edit]

As far as Mullvad Downloader by Kicksecure developers goes:

  • No need to deproxy anything. It's really just a downloader. It doesn't do anything unexpected which the user wouldn't do when manually downloading Mullvad Browser. Any files provided by the browser itself are unmodified. No additional settings are applied.

As far as Whonix environment:

  • related: Tor Browser Bundle versus Whonix Tor Browser
  • Why is it related?
  • All changes are done through global environmental variable adjustments.

    • Search for that quote, see the footnote to see to see the source code files setting the environmental variables.
  • It is untested if/how this environment variables influence Mullvad Browser.

As far as Mullvad Browser goes:

  • If in theory Mullvad Browser would have its own proxy and/or VPN enforcement, Whonix wouldn't touch, influence that. It would still apply as in any other operating system.
  • Same goes for Mullvad DNS settings (DNS over HTTPS (DOH)). Quote Mullvad Browser documentationarchive.org iconarchive.today icon:
    • The Mullvad Browser uses the Mullvad DNS service (without content blockers) by default.

    • We recommend that you use our encrypted DNS service only when you are not connected to Mullvad VPN. When you are connected to Mullvad VPN the DNS queries will be sent through the encrypted VPN tunnel to the DNS server on the Mullvad VPN server that you are connected to, and that is faster.

  • Same goes for Mullvad choice or non-choice to block connections to 127.0.0.1 / localhost.
  • Questions about how to configure Mullvad Browser should be directed to Mullvad, not Whonix.

Disabling Mullvad Browser Download Stream Isolation[edit]

Covered on the Stream_Isolation/Disable_Easy wiki page.

Discussions[edit]

Notification image

We believe security software like Whonix needs to remain open source and independent. Would you help sustain and grow the project? Learn more about our 13 year success story and maybe DONATE!