ZeroNet - Decentralized websites
Works in Whonix 14+
ZeroNet uses Bitcoin cryptography and BitTorrent technology to build a decentralized censorship-resistant network.
Users can publish static or dynamic websites into ZeroNet and visitors can choose to also serve the website. Websites will remain online even if it is being served by only one peer.
Connecting to Tor before ZeroNet
User -> Tor -> ZeroNet -> Internet
Since there is no package of ZeroNet in Debian yet, you have to manually install it.  
Inside Whonix-Gateway, run the following commands in a terminal to extend Onion Grater to allow Zeronet:
sudo cp /usr/share/onion-grater-merger/examples/40_onionshare.yml /etc/onion-grater-merger.d/
sudo service onion-grater restart
Run the following commands in a terminal inside Whonix-Workstation to download and verify Zeronet via git:
Get ZeroNet's signing key. 
gpg --recv-keys "960F FF2D 6C14 5AA6 13E8 491B 5B63 BAE6 CB96 13AE"
Update the package lists.
sudo apt-get install git python-msgpack python-gevent
git clone https://github.com/HelloZeroNet/ZeroNet.git
Get into ZeroNet folder.
Check ZeroNet signature.
./zeronet.py --tor always --fileserver_ip $(qubesdb-read /qubes-ip)
./zeronet.py --tor always --fileserver_ip 10.152.152.11
Add FoxyProxy to Tor Browser in Whonix.
Warning: Installing FoxyProxy worsens the user's browser fingerprint and adversely affects anonymity since it is not a default Tor Browser add-on. The Tor Project's anonymity warning is explicit: 
Can I install other Firefox extensions?
Tor Browser is free software, so there is nothing preventing you from modifying it any way you like. However, we do not recommend installing any additional Firefox add-ons with Tor Browser. Add-ons can break your anonymity in a number of ways, including browser fingerprinting and bypassing proxy settings.
When using a browser and FoxyProxy in combination, a user's web fingerprint becomes more unique. The potential fingerprinting harm to user anonymity depends on how many others are running Tor Browser in conjunction with FoxyProxy.
This configuration is so specialized that probably very few are doing it, reducing the user pool to a small subset. Due to the risk, this approach is generally recommended against. If a user decides to proceed anyhow, the tunnel configuration should not be combined with any browser other than Tor Browser (like Firefox or Chrome), due to an even greater browser fingerprinting risk.
This warning equally applies to configurations such as Tor Browser and I2P, or Tor Browser and remote (http(s)/socks4/5) proxies.
To install FoxyProxy, follow these steps in the Whonix-Workstation (Qubes-Whonix: Whonix-Workstation AppVM).  
Make the tbb-foxyproxy config file available to Tor Browser.  
cp /usr/share/usability-misc/tbb-foxyproxy/foxyproxy.xml /home/user/.tb/tor-browser/Browser/TorBrowser/Data/Browser/profile.default/
Navigate to addons.mozilla.org.
Tor Browser Menu ->
Download and install the FoxyProxy add-on. 
Search: "foxyproxy" ->
Install: FoxyProxy Standard
Restart Tor Browser.
When prompted, select
After restart, the FoxyProxy icon should appear in the Tor Browser toolbar and be enabled. Check you can interact with it and change proxy settings as required.
After FoxyProxy is installed, you may see an app-armory warning you about the denied creation of dconf/user. The current Debian profile for Firefox does not yet include the modern temporary file location /run/user. However, this can be safely ignored since FoxyProxy never needs access to this dconf/user. However, if you'd like give the Tor Browser permission to use tempory file directory /run/user/ and not receive the warning, edit the file
kdesudo kwrite /etc/apparmor.d/home.tor-browser.firefox
And uncomment line
# owner /run/user/[0-9]*/** rwkl,
by removing the #.
To reverse this procedure and restore the default Tor Browser fingerprint:
- Non-Qubes-Whonix: It is best to use a VM snapshot taken before installing the add-on.
- Qubes-Whonix: FoxyProxy should be installed to a specific Whonix-Workstation AppVM set up for proxy purposes. The AppVM can be discarded at leisure.
If Non-Qubes-Whonix users did not take a snapshot prior to these changes, Tor Browser can be downloaded again. Alternatively, FoxyProxy can be removed via the
For further technical discussion of FoxyProxy, see the Whonix forum.
Start Tor Browser.
If you are using Qubes-Whonix.
Qubes Start Menu ->
Whonix-Workstation AppVM (commonly called anon-whonix) ->
If you are using Non-Qubes-Whonix.
Start Menu ->
If you are using a terminal (Konsole).
Go to the ZeroNet web interface. Paste http://127.0.0.1:43110 into Tor Browser's url field and press enter.
Done. You can now use ZeroNet.
- ↑ https://www.torproject.org/docs/faq.html.en
- ↑ The following instructions have been tested as functional in Tor Browser versions 6.5, 7.0a1 and 7.0a2 "hardened". https://lists.torproject.org/pipermail/tbb-dev/2017-February/000471.html
- ↑ Some users report xpinstall.signatures.required needs to be disabled in Tor Browser about:config settings to enable FoxyProxy, when it is installed from the Debian repository. This workaround is not required when installing FoxyProxy from addons.mozilla.org. https://forums.whonix.org/t/new-version-of-tbb-no-longer-accepts-foxyproxy-plugin
- ↑ This procedure is safe. Since Firefox 43, all add-ons on Mozilla's servers are signed and verified. https://wiki.mozilla.org/Add-ons/Extension_Signing
Impressum | Datenschutz | Haftungsausschluss
https | (forcing) onion
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! See Conditions for Contributions to Whonix, then Edit! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.
Whonix (g+) is a licensee of the Open Invention Network. Unless otherwise noted, the content of this page is copyrighted and licensed under the same Libre Software license as Whonix itself. (Why?)