Jump to: navigation, search

Whonix Release Notes

Whonix 13[edit]

Whonix 13 was released on 31 May, 2016. [1] Whonix 13 contains many small security and usability improvements, features and bug fixes. [2] [3] [4]

Changelog - All Platforms[edit]

AppArmor

  • Fixed the Tor Browser AppArmor profile to allow correct functionality. [5]
  • Resolved AppArmor conflicts affecting Pidgin, Chromium and Evince. [6]
  • Merged AppArmor profiles for sdwdate, timesync and whonix-check into their corresponding packages and now install them by default. [7]


Bug Fixes

  • Fixed broken whonix-setup-wizard functionality. [8]


Code

  • Updated Whonix code for Tor Browser tb-updater. [9]
  • Refactored the Whonix socks redirection firewall rules to reduce their size and use less script code. [10] [11]
  • Refactored Whonix code so that scripts only use configuration files that end with the .conf extension. [12]


Improved Functionality and Usability

  • Modified whonixcheck to test for slow or fast system clocks which prevent Tor from properly connecting. [13]
  • Implemented an explicit check for timekeeping watchdog kernel messages in whonixcheck, so users are warned about clock jumps which prevent / time-out Tor connections. [14]
  • Enforced maximized terminal windows for xdg desktop users. [15] [16]
  • Enabled Transparent Proxy Ports for Whonix-Gateway by default (except for Whonix-Firewall). [17] [18]
  • Configured Whonix to use /etc/skel instead of writing to the home folder directly to maintain forward compatibility with Qubes. Further, this allows for proper error-handling where "user" is hardcoded in Whonix, and a newly created account with a different name has been used. [19]
  • Deprecated the timesync progress bar and replaced it with a tray icon using sdwdate-gui to improve usability and reduce confusion. [20]
  • Created a stable-proposed-updates repository for users who want to help in testing Whonix fixes, without resorting to the testers repository which comes with many more changes. [21]
  • Moved the WhonixBackupScript to the usability-misc package to make it more accessible. [22]
  • Replaced XChat with HexChat, since the former is no longer actively maintained, and created a new AppArmor profile to contain it. [23]
  • Implemented a VPN_FIREWALL feature as part of whonix-ws-firewall. [24]


Security Enhancements

  • Created a security-misc package that turns off Nautilus and Dolphin file previews by default, since this poses security risks. [25]
  • A known, good version of Tor is now maintained and uploaded to the Whonix repository from deb.torproject.org [26]
  • Uploaded the Tor 0.3.2.9 major (stable) release to the Whonix repository to enable full v3 onion functionality for both hosting of onion services and access to v3 onion addresses in Tor Browser. [27]
  • Extended the lifetime of the Whonix signing key. [28]
  • Sourced new onion services webservers for the sdwdate feature, which ensures the system's clock is correctly set for security, privacy and anonymity purposes. [29]

Changelog - Qubes-Whonix[edit]

Bug Fixes

  • Fixed qubes-whonix-firewall systemd service start. [30] [31]
  • Resolved whonixcheck fixes for Qubes R4. [32]
  • Corrected false positive failure messages for the updates proxy test in Qubes R4. [33] [34]
  • Disabled qubes-SetDateTime / qubes.SyncNtpClock in Qubes-Whonix VMs since it interfered with timesync. [35]
  • Resolved accumulation of old Tor Browser instances in /var/cache/tb-binary/.tb/ which caused users to run into full disk error messages. [36]
  • Resolved an occasional error message whereby Whonix templates incorrectly reported they were not connected to the Whonix-Gateway ProxyVM. [37]
  • Resolved the broken anon-ws-disable-stackedtor function in Qubes-Whonix. [38]
  • Enforced the opening of all links from sys-whonix, whonix-gw and whonix-ws in the anon-whonix AppVM to prevent error messages. [39]


Builds

  • Corrected the build failure of Whonix-Workstation template in Qubes-Whonix R3.2 and added the qubes-template-whonix to continuous integration service TravisCI. [40]
  • Resolved Whonix template build failures in Qubes R4 related to Tor Browser downloads. [41]
  • Changed the Qubes-Whonix build process to install Whonix from the Whonix binary APT repository. This simplifies code, results in faster builds, removes build dependencies inside the template, and reduces the overall template size. [42]
  • Allowed the Whonix build script to run as root and reworked user_name. [43]


Code

  • Removed fetching of Whonx source code in qubes-template-whonix. [44]
  • Removed the qubes-update-check system service from Qubes-Whonix TemplateVMs, since it was unnecessary. [45] [46]
  • Reworked / removed a number of installed packages in Qubes-Whonix which are only required for the non-Qubes-Whonix desktop. [47] [48]
  • Removed the default username and password in the Qubes-Whonix terminal, because it is not required. [49]


Improved Functionality and Usability

  • Ported whonixcheck and tb-updater to Qubes' qrexec-based updates proxy, since TemplateVMs are non-networked by default in Qubes R4. [50]
  • Changed the tb-updater configuration to use Qubes updates proxy, since Qubes R4 sets the NetVM of TemplateVMs to none by default. [51]
  • Implemented the ability to install Whonix-Workstation and Whonix-Gateway from dom0 with a sudo apt-get install whonix-(workstation|gateway) feature. [52]
  • Ported the bind-directories functionality upstream to Qubes. [53]
  • Implemented the new bind-directories functionality in Qubes-Whonix. [54]
  • Implemented a check for whether the whonix-gw ProxyVM (sys-whonix) has a NetVM which is set to "none", with a warning shown if this is the case. [55]
  • Implemented a new feature so that following an update of the Whonix-Workstation TemplateVM, newly created AppVMs based on the updated TemplateVM come with an up-to-date version of Tor Browser. [56]
  • Modified whonixcheck to check if: Whonix-Gateway is running in a NetVM or ProxyVM; Whonix-Workstation is running in an AppVM; and to skip the test if a TemplateVM is detected. [57]


Security Enhancements

  • Prevented /usr/lib/qubes/qubes-setup-dnat-to-ns from running in Qubes-Whonix to stop it from modifying firewall rules. [58]

Whonix 14[edit]

Whonix 14 is due to be released in early 2018. Significantly, Whonix 14 is based on the Debian stretch (Debian 9) distribution which was released in mid-2017, instead of Debian jessie (Debian 8). [59]. Users will therefore have access to numerous updated and new software packages, a more modern branch of GnuPG, and more. [60] [61] [62]

Changelog - All Platforms[edit]

AppArmor

  • Fixed the whonixcheck AppArmor profile to remove continuous denied messages relating to signal. [63]
  • Fixed the AppArmor profile for obfs4proxy to enable correct functioning of Tor Bridges in Whonix-Gateway. [64]
  • Fixed the Tor Browser AppArmor profile to allow correct functionality. [65]
  • Corrected the tor-controlport-filter AppArmor profile to ensure correct functioning. [66]
  • Removed the Pidgin AppArmor profile, since Pidgin is recommended against for security reasons. [67]
  • Hardened the Control Port Filter AppArmor profile. [68]
  • Disabled installation of aa-notify (AppArmor notifications) by default, thereby removing the reporting of mostly harmless denied messages. [69] [70]


Bug Fixes

  • Corrected the broken whonix-setup-wizard autostart on Whonix-Gateway. [71]
  • Fixed sdwdate-gui freezing when using right-click in the menu. [72]
  • Fixed dependency issues which prevented the whonix-setup-wizard gui from starting. [73]


Builds

  • Resolved genmkfile build dependencies for building Whonix-Workstation and Whonix-Gateway. [74]
  • Confirmed the new and upgraded Whonix 14 builds are identical. [75] [76]
  • Fixed debian/control parsing with respect to make_deb_build_dependencies / make_deb_runtime_dependencies. [77]


Code

  • Updated Whonix code for Tor Browser tb-updater. [78]
  • Changed the bindp compile to postinstall to make it cross-platform (Qubes, 64-bit, 32-bit). [79]
  • Rewrote sclockadj in C and updated the sdwdate package to compile sclockadj. [80] [81]
  • Removed the Control Port Filter Proxy script from anon-ws-disable-stacked-tor since it is no longer required for proper Tor connections or Tor Browser functions (its functionality is now replaced by onion-grater). This means Ricochet, Zeronet and OnionShare are now compatible with Whonix. [82] [83] [84]
  • Implemented symlinks for onion-grater profiles to maintain functionality following profile upgrades. [85]
  • Enhanced onion checking in sdwdate to improve the unit test. [86]
  • Ported msgcollector to python3 and python3-pyqt5. [87]
  • Ported whonix-setup-wizard to python3. [88]
  • Ported python-guimessages to python3. [89]
  • Rewrote sdwdate to ensure python exceptions are written to the journal. [90]
  • Rewrote control-port-filter-python to ensure exceptions are written to the journal. [91]
  • Re-added some non-essential packages to Whonix that were removed from Debian stretch. [92] [93]
  • Ported anon-shared-helper-scripts so they instead use Tor authentication cookies. [94]
  • Ported whonixcheck check_tor_socks_port_reachability.bsh to use the Tor unix domain socket socks file. [95]
  • Ported anon-ws-disable-stacked-tor to systemd socket activation to remove unnecessary, idle socat listeners. [96] [97]
  • Removed auditd configuration folder parsing /etc/audit/rules.d/ by default, since the feature has been implemented upstream.
  • Implemented anonymous counting of Whonix users via the whonixcheck Whonix News function. [98]
  • Implemented, but did not activate changes to the Whonix firewall so: sdwdate is stopped before suspend; timesync-fail-closed mode is set before suspend; sdwdate is restarted after resume; and Whonix firewall enters full mode after resume following successful sdwdate activation. [99]
  • Configured auditd to process the configuration folder /etc/audit/rules.d/ by default to aid debugging. [100] [101]
  • Implemented monitoring of changes to /var/lib/tor/lock access rights via auditd to aid debugging. [102]
  • Modified anon-ws-disable-stacked-tor to maintain Tor Browser functionality with Unix domain socket files redirection and prevent Tor over Tor scenarios. [103]
  • Changed the Whonix-Gateway firewall prerouting rules for socks ports so they do not interfere with trans port traffic. [104]
  • Modified whonixcheck to first test if network interfaces are up to prevent the test from failing unnecessarily. [105]
  • Configured whonixcheck to test for failed daemons. [106]
  • Implemented a sdwdate sd_notify systemd watchdog. [107]
  • Disabled systemd-resolved and instead implemented a /lib/systemd/system/systemd-resolved.service.d/ drop-in. [108]
  • Ported /usr/sbin/service to systemctl as the latter runs non-interactively. [109]
  • Disabled timedatectl network time synchronization in Debian stretch to prevent conflicts with sdwdate. [110]
  • Removed brltty, brltty-speechd and brltty-x11 since they create a local listener port which may conflict with onion-grater. [111]
  • Fixed a whonixcheck whonix-firewall check race condition. [112]


Improved Functionality and Usability

  • Implemented the major new Anon Connection Wizard feature into Whonix to simplify connections to the Tor network via a Tor bridge and/or a proxy. [113]
  • Integrated the Tor Pluggable Transport meek_lite. [114]
  • Installed necessary dependencies for proper ZeroNet functionality. [115]
  • Installed onioncircuits by default in Whonix-Gateway. [116]
  • Added --list-interface to tor-controlport-filter, as it works better with dynamic IP addresses. [117]
  • Added a /etc/tor-controlport-filter.d configuration extension feature. [118]
  • Fixed the control-port-filer-python configuration to rewrite HS_DESC replies by Tor so onionshare can be supported in the future. [119]
  • Merged the tor-controlport-filter by Tails for various enhancements. [120]
  • Implemented more user-friendly error messages (instead of tb-starter error handlers) when non-Whonix related Tor Browser issues cause start-tor-browser to fail and exit zero. [121]
  • Implemented sane built-in defaults for whonix-gw-firewall, whonix-ws-firewall, whonixcheck, sdwdate, uwt, onion-grater, rads, open-link-confirmation, tb-starter and tb-updater, even if configuration files do not exist. [122]
  • Changed uwt to set AllowOutboundLocalhost / AllowInbound which can help make servers utilizing Tor onion services work. [123]
  • Implemented a sd_notify watchdog feature for onion-grater so the service is restarted if it appears to be running, but has became unresponsive. [124]
  • Created a bindp Whonix package to enable Whonix-Workstation applications that use Tor ephemeral onion services to bind on all interfaces as necessary. [125]
  • Modified sdwdate to check if the clock is changed "behind the back" of the program and suggest a manual user fix. [126]
  • Improved default torsocks information / warning messages when wrapped commands are invoked to reduce user confusion. [127]
  • Both non-Qubes-Whonix and Qubes-Whonix are now compatible with the Tor Project's sandboxed Tor Browser.


Security Enhancements

  • Onion sources are now preferred in sources.list for Whonix updates / upgrades. [128]
  • Confirmed functionality of the kloak anti-keystroke deanonymization tool in Whonix. [129] [130]
  • Identified more reliable onion servers as appropriate time sources for sdwdate, which enables correct network time synchronization for anonymity-focused distributions. [131]
  • Implemented Tails' Control Port Filter Proxy in Whonix and merged recent changes since it was forked. [132] [133]
  • Fixed security and hardening (stack canary) issues with the bindp libindp.so package (which were merged upstream). [134]
  • Uploaded the Tor 0.3.2.9 major (stable) release to the Whonix repository to enable full v3 onion functionality for both hosting of onion services and access to v3 onion addresses in Tor Browser. [135]
  • Disabled the apt-timer in Debian stretch to prevent auto updates, thereby preventing the attendant security risks associated with background updates without user input. [136]
  • Disabled nautilus previews by default due to the security risks. [137]
  • Implemented uwt to set TORSOCKS_ISOLATE_PID in Debian Stretch so all uwt wrapped applications are stream isolated. [138]
  • Implemented tor+http / apt-transport-tor rather than Acquire::BlockDotOnion "false" for better security and stream isolation. [139]
  • Disabled the systemd DNS resolver feature in order to reduce the attack surface and to remove the potential for adverse anonymity impacts. [140]
  • Established a dedicated Whonix.org repository, with appropriate redirects from Whonix mirrors. [141]
  • Removed the DHCP client from Whonix-Gateway and switched to a static network configuration so the dhclient is no longer present on all interfaces, including the internal network. [142]

Changelog - Non-Qubes-Whonix[edit]


Bug Fixes

  • Increased the Whonix-Gateway VRAM in VirtualBox from 8 to 16 MB to avoid error messages and possible video problems when using full screen mode. [144]
  • Corrected sdwdate-gui systray so it properly registers in kde systray and does not appear as a gap in the Entry column. [145]
  • Corrected the sdwdate-gui tray icon so it is visible in Debian stretch. [146]
  • Corrected the virtualization detection method to properly recognize KVM. [147]


Code

  • Removed kmix-disable-autostart since it is no longer required to make sure the clipboard history icon is loaded into the system tray. [148]


Improved Functionality and Usability

  • Created the grub-live package which can run Whonix as a live system. [149] [150]
  • Added Kscreen to Whonix by default in order to allow DPI scaling and other basic desktop features of Plasma 5. [151]
  • Removed the VirtualBox shared folder and confirmed automounting of shares is enabled in Debian stretch. [152]


Security Enhancements

  • Removed okular from anon-shared-applications-kde to anon-workstation-default-applications so it is not installed on Whonix-Gateway. [153]
  • Hide the CPUID in VirtualBox 5 by setting generic values via HostCPUID. [154]


Changelog - Qubes-Whonix[edit]

Bug Fixes

  • Resolved whonixcheck fixes for Qubes R4. [155]
  • Corrected false positive failure messages for the updates proxy test in Qubes R4. [156] [157]
  • Resolved non-functionality of Tor Browser due to jemalloc corruption. [158]
  • Resolved segfaults in Tor Browser caused by excessive string length in the XDG_CONFIG_DIRS environment variable. [159]
  • Resolved accumulation of old Tor Browser instances in /var/cache/tb-binary/.tb/ which caused users to run into full disk error messages. [160]
  • Corrected dependencies in the qubes-whonix package to resolve issues when upgrading to Debian stretch. [161]
  • Fixed a corridor lintian warning on Debian related to systemd documentation. [162]
  • Resolved error messages associated with tput using an empty TERM environment variable. [163]


Builds

  • Corrected the build failure of Whonix-Workstation template in Qubes-Whonix R3.2 and added the qubes-template-whonix to continuous integration service TravisCI. [164]


Code

  • Removed cups and system-config-printer from Whonix-Workstation, since printing capabilities are more suited to alternative VMs and this also removes a local TCP listener that is otherwise created. [165]
  • Corrected anon-meta-packages compatibility for Qubes R3.2 and R4. [166]


Improved Functionality and Usability

  • Confirmed full Qubes-Whonix compatibility with Qubes R4. [167]

Footnotes[edit]

  1. https://www.whonix.org/blog/whonix-13-released
  2. https://phabricator.whonix.org/maniphest/query/TfpGK0Sq8w1j/#R
  3. Descriptions of changes in Whonix 12 and earlier versions can be found on sourceforge.net
  4. A handful of issues have been fixed in both Whonix 13 and Whonix 14 and backported to both versions.
  5. https://phabricator.whonix.org/T672
  6. https://phabricator.whonix.org/T314
  7. https://phabricator.whonix.org/T201
  8. https://phabricator.whonix.org/T499
  9. https://phabricator.whonix.org/T666
  10. https://phabricator.whonix.org/T465
  11. The same firewall rules are still applied.
  12. https://phabricator.whonix.org/T286
  13. https://phabricator.whonix.org/T482
  14. https://phabricator.whonix.org/T480
  15. https://phabricator.whonix.org/T451
  16. For instance, tor-arm, restart Tor and other terminal programs.
  17. https://phabricator.whonix.org/T435
  18. This does not enable transparent proxying by default, but is required in Qubes so tinyproxy traffic can be redirected to 127.0.01 instead of to qubes-netvm-gateway.
  19. https://phabricator.whonix.org/T419
  20. https://phabricator.whonix.org/T300
  21. https://phabricator.whonix.org/T200
  22. https://phabricator.whonix.org/T159
  23. https://phabricator.whonix.org/T40
  24. https://phabricator.whonix.org/T158
  25. https://phabricator.whonix.org/T418
  26. https://phabricator.whonix.org/T472
  27. https://phabricator.whonix.org/T764
  28. https://phabricator.whonix.org/T497
  29. https://phabricator.whonix.org/T266
  30. https://phabricator.whonix.org/T528
  31. This fixes various bugs relating to Tor starting / failing multiple times and qubes-whonix-torified-updates-proxy sometimes failing.
  32. https://phabricator.whonix.org/T724
  33. https://phabricator.whonix.org/T723
  34. Qubes R4 RC1.
  35. https://phabricator.whonix.org/T384
  36. https://phabricator.whonix.org/T671
  37. https://phabricator.whonix.org/T496
  38. https://phabricator.whonix.org/T454
  39. https://phabricator.whonix.org/T452
  40. https://phabricator.whonix.org/T527
  41. https://phabricator.whonix.org/T710
  42. https://phabricator.whonix.org/T498
  43. https://phabricator.whonix.org/T416
  44. https://phabricator.whonix.org/T507
  45. https://phabricator.whonix.org/T433
  46. The qubes-update-check.service already has improved upgrade notifications.
  47. https://phabricator.whonix.org/T429
  48. For instance, plasma-widget-folderview, kde-kdm-autologin, split the anon-shared-desktop-kde package and so on.
  49. https://phabricator.whonix.org/T428
  50. https://phabricator.whonix.org/T491
  51. https://phabricator.whonix.org/T477
  52. https://phabricator.whonix.org/T461
  53. https://phabricator.whonix.org/T414
  54. https://phabricator.whonix.org/T501
  55. https://phabricator.whonix.org/T421
  56. https://phabricator.whonix.org/T417
  57. https://phabricator.whonix.org/T406
  58. https://phabricator.whonix.org/T502
  59. https://www.debian.org/releases/stretch/
  60. https://www.debian.org/News/2017/20170617
  61. https://www.debian.org/releases/stable/amd64/release-notes/
  62. https://www.debian.org/releases/stable/i386/release-notes/
  63. https://forums.whonix.org/t/apparmor-and-kernel-4-14-18-1-creates-tons-of-kern-log-pop-ups/4811?
  64. https://phabricator.whonix.org/T676
  65. https://phabricator.whonix.org/T672
  66. https://phabricator.whonix.org/T587
  67. https://phabricator.whonix.org/T568
  68. https://phabricator.whonix.org/T532
  69. https://phabricator.whonix.org/T557
  70. Advanced users are still recommended to install aa-notify in the Whonix documentation to investigate relevant warnings.
  71. https://phabricator.whonix.org/T640
  72. https://phabricator.whonix.org/T626
  73. https://phabricator.whonix.org/T592
  74. https://phabricator.whonix.org/T700
  75. https://phabricator.whonix.org/T760
  76. https://phabricator.whonix.org/T761
  77. https://phabricator.whonix.org/T643
  78. https://phabricator.whonix.org/T666
  79. https://phabricator.whonix.org/T688
  80. https://phabricator.whonix.org/T686
  81. https://phabricator.whonix.org/T650
  82. Onionshare is not installed by default in Whonix 14 because it is not in the stretch repository, however it may be manually installed using the available wiki instructions.
  83. https://phabricator.whonix.org/T657
  84. onion-grater:
    Filters out Tor control protocol commands that are dangerous for anonymity such as GETINFO ADDRESS using a whitelist. Acts as a proxy between the client application and Tor.


    For example it allows using Tor Browser's New Identity feature on Anonymity Distribution Workstations, fixes Tor Browser's about:tor default homepage and Tor Button status indicator without exposing commands that are dangerous for anonymity.
  85. https://phabricator.whonix.org/T768
  86. https://phabricator.whonix.org/T648
  87. https://phabricator.whonix.org/T632
  88. https://phabricator.whonix.org/T628
  89. https://phabricator.whonix.org/T627
  90. https://phabricator.whonix.org/T608
  91. https://phabricator.whonix.org/T603
  92. https://phabricator.whonix.org/T601
  93. gtk3-engines-oxygen.
  94. https://phabricator.whonix.org/T578
  95. https://phabricator.whonix.org/T548
  96. https://phabricator.whonix.org/T623
  97. This also reduces the RAM load caused by too many socat instances.
  98. https://phabricator.whonix.org/T689
  99. https://phabricator.whonix.org/T551
  100. https://phabricator.whonix.org/T535
  101. https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=833474
  102. https://phabricator.whonix.org/T537
  103. https://phabricator.whonix.org/T192
  104. https://phabricator.whonix.org/T462
  105. https://phabricator.whonix.org/T490
  106. https://phabricator.whonix.org/T488
  107. https://phabricator.whonix.org/T639
  108. https://phabricator.whonix.org/T762
  109. https://phabricator.whonix.org/T637
  110. https://phabricator.whonix.org/T589
  111. https://phabricator.whonix.org/T563
  112. https://phabricator.whonix.org/T675
  113. https://phabricator.whonix.org/T699
  114. https://forums.whonix.org/t/censorship-circumvention-tor-pluggable-transports/2601
  115. https://phabricator.whonix.org/T701
  116. https://forums.whonix.org/t/onioncircuits-viewing-the-status-and-circuits-of-tor/2539
  117. https://phabricator.whonix.org/T579
  118. https://phabricator.whonix.org/T576
  119. https://phabricator.whonix.org/T574
  120. https://phabricator.whonix.org/T573
  121. https://phabricator.whonix.org/T510
  122. https://phabricator.whonix.org/T503
  123. https://phabricator.whonix.org/T357
  124. https://phabricator.whonix.org/T274
  125. https://phabricator.whonix.org/T561
  126. https://phabricator.whonix.org/T481
  127. https://phabricator.whonix.org/T73
  128. v3 onions will be preferred by default.
  129. https://phabricator.whonix.org/T583
  130. kloak will not be packaged in Whonix by default until various upstream issues are resolved.
  131. https://phabricator.whonix.org/T647
  132. https://phabricator.whonix.org/T617
  133. https://phabricator.whonix.org/T612
  134. https://phabricator.whonix.org/T599
  135. https://phabricator.whonix.org/T764
  136. https://phabricator.whonix.org/T590
  137. https://phabricator.whonix.org/T500
  138. https://phabricator.whonix.org/T356
  139. https://phabricator.whonix.org/T610
  140. https://phabricator.whonix.org/T471
  141. https://phabricator.whonix.org/T475
  142. https://phabricator.whonix.org/T559
  143. Until it is determined how to enable kde-folderview in Debian stretch.
  144. https://phabricator.whonix.org/T680
  145. https://phabricator.whonix.org/T638
  146. https://phabricator.whonix.org/T598
  147. https://github.com/Whonix/shared-folder-help/commit/2130d872d4e346bc490e70fca79e572d1d1f86df
  148. https://phabricator.whonix.org/T722
  149. https://phabricator.whonix.org/T714
  150. grub-live is not installed by default in Whonix 14 and is an optional package only.
  151. https://phabricator.whonix.org/T703
  152. https://phabricator.whonix.org/T702
  153. https://github.com/Whonix/anon-meta-packages/commit/a22b1807c79cb1d21447c83ed251c331cf6222f1
  154. https://phabricator.whonix.org/T408
  155. https://phabricator.whonix.org/T724
  156. https://phabricator.whonix.org/T723
  157. Qubes R4 RC1.
  158. https://phabricator.whonix.org/T651
  159. https://phabricator.whonix.org/T767
  160. https://phabricator.whonix.org/T671
  161. https://phabricator.whonix.org/T620
  162. https://phabricator.whonix.org/T607
  163. https://phabricator.whonix.org/T505
  164. https://phabricator.whonix.org/T527
  165. https://phabricator.whonix.org/T619
  166. https://phabricator.whonix.org/T697
  167. https://phabricator.whonix.org/T698

Random News:

Are you proficient with iptables? Want to contribute? Check out possible improvements to iptables. Please come and introduce yourself in the development forum.


https | (forcing) onion

Share: Twitter | Facebook

This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! See Conditions for Contributions to Whonix, then Edit! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix is a licensee of the Open Invention Network. Unless otherwise noted, the content of this page is copyrighted and licensed under the same Libre Software license as Whonix itself. (Why?)