ZeroNet - Decentralized websites
Won't work in Whonix 13. You need to wait for Whonix 14.
Connecting to Tor before ZeroNet
User -> Tor -> ZeroNet -> Internet
Since there is no package of ZeroNet in Debian yet, you have to manually install it.  
Get ZeroNet's signing key. 
gpg --recv-keys "960F FF2D 6C14 5AA6 13E8 491B 5B63 BAE6 CB96 13AE"
Update the package lists.
sudo apt-get install python-stem python-msgpack git
git clone https://github.com/HelloZeroNet/ZeroNet.git
Get into ZeroNet folder.
Check ZeroNet signature.
Start ZeroNet. - Does not work yet! 
./zeronet.py --tor always --fileserver_ip $(qubesdb-read /qubes-ip)
./zeronet.py --tor always --fileserver_ip 10.152.152.11
Add FoxyProxy to Tor Browser in Whonix.
Warning: Installing FoxyProxy worsens the user's browser fingerprint and adversely affects anonymity since it is not a default Tor Browser add-on. The Tor Project's anonymity warning is explicit: 
Can I install other Firefox extensions?
Tor Browser is free software, so there is nothing preventing you from modifying it any way you like. However, we do not recommend installing any additional Firefox add-ons with Tor Browser. Add-ons can break your anonymity in a number of ways, including browser fingerprinting and bypassing proxy settings.
When using a browser and FoxyProxy in combination, a user's web fingerprint becomes more unique. The potential fingerprinting harm to user anonymity depends on how many others are running Tor Browser in conjunction with FoxyProxy.
This configuration is so specialized that probably very few are doing it, reducing the user pool to a small subset. Due to the risk, this approach is generally recommended against. If a user decides to proceed anyhow, the tunnel configuration should not be combined with any browser other than Tor Browser (like Firefox or Chrome), due to an even greater browser fingerprinting risk.
This warning equally applies to configurations such as Tor Browser and I2P, or Tor Browser and remote (http(s)/socks4/5) proxies.
To install FoxyProxy, follow these steps in the Whonix-Workstation (Qubes-Whonix: Whonix-Workstation AppVM).  
Make the tbb-foxyproxy config file available to Tor Browser.  
cp /usr/share/usability-misc/tbb-foxyproxy/foxyproxy.xml /home/user/.tb/tor-browser/Browser/TorBrowser/Data/Browser/profile.default/
Navigate to addons.mozilla.org.
Tor Browser Menu ->
Download and install the FoxyProxy add-on. 
Search: "foxyproxy" ->
Install: FoxyProxy Standard
Restart Tor Browser.
When prompted, select
After restart, the FoxyProxy icon should appear in the Tor Browser toolbar and be enabled. Check you can interact with it and change proxy settings as required.
To reverse this procedure and restore the default Tor Browser fingerprint:
- Non-Qubes-Whonix: It is best to use a VM snapshot taken before installing the add-on.
- Qubes-Whonix: FoxyProxy should be installed to a specific Whonix-Workstation AppVM set up for proxy purposes. The AppVM can be discarded at leisure.
If Non-Qubes-Whonix users did not take a snapshot prior to these changes, Tor Browser can be downloaded again. Alternatively, FoxyProxy can be removed via the
Tor Browser will soon ship with sandboxing on an opt-in basis. Unfortunately, the initial sandbox versions are incompatible with this configuration and it must not be enabled.  Users with AppArmor enabled may see Tor Browser profile warning messages. These messages can be safely ignored, since they do not prevent FoxyProxy functioning at this time.
For further technical discussion of FoxyProxy, see the Whonix forum.
Start Tor Browser.
If you are using Qubes-Whonix.
Qubes Start Menu ->
Whonix-Workstation AppVM (commonly called anon-whonix) ->
If you are using Non-Qubes-Whonix.
Start Menu ->
If you are using a terminal (Konsole).
Go to the ZeroNet web interface. Paste http://127.0.0.1:43110 into Tor Browser's url field and press enter.
Done. You can now use ZeroNet.
You won't be able to use the following specialized Tor mode, you won't be able to use
--tor always in Whonix 13.
It is because a newer version of control-port-filter-python will be required which will be available when Whonix 14 gets released.
- ↑ https://www.torproject.org/docs/faq.html.en
- ↑ The following instructions have been tested as functional in Tor Browser versions 6.5, 7.0a1 and 7.0a2 "hardened". https://lists.torproject.org/pipermail/tbb-dev/2017-February/000471.html
- ↑ Some users report xpinstall.signatures.required needs to be disabled in Tor Browser about:config settings to enable FoxyProxy, when it is installed from the Debian repository. This workaround is not required when installing FoxyProxy from addons.mozilla.org. https://forums.whonix.org/t/new-version-of-tbb-no-longer-accepts-foxyproxy-plugin
- ↑ This procedure is safe. Since Firefox 43, all add-ons on Mozilla's servers are signed and verified. https://wiki.mozilla.org/Add-ons/Extension_Signing
- ↑ https://lists.torproject.org/pipermail/tor-dev/2016-December/011733.html
Impressum | Datenschutz | Haftungsausschluss
https | (forcing) onion
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! See Conditions for Contributions to Whonix, then Edit! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.
Whonix (g+) is a licensee of the Open Invention Network. Unless otherwise noted, the content of this page is copyrighted and licensed under the same Libre Software license as Whonix itself. (Why?)