|The following information only applies to the testers-only version of Whonix.|
(Whonix 14 and above).
ZeroNet uses Bitcoin cryptography and BitTorrent technology to build a decentralized censorship-resistant network.
Users can publish static or dynamic websites into ZeroNet and visitors can choose to also serve the website. Websites will remain online even if it is being served by only one peer.
Connecting to Tor before ZeroNet
User -> Tor -> ZeroNet -> Internet
Extend onion-grater Whitelist
Run the following commands in a terminal inside Whonix-Workstation to download and verify Zeronet via git:
Get ZeroNet's signing key. 
gpg --recv-keys "960F FF2D 6C14 5AA6 13E8 491B 5B63 BAE6 CB96 13AE"
Update the package lists.
sudo apt-get update
sudo apt-get install git python-msgpack python-gevent
git clone https://github.com/HelloZeroNet/ZeroNet.git
Get into ZeroNet folder.
Check ZeroNet signature.
git log --show-signature
./zeronet.py --tor always --fileserver_ip $(qubesdb-read /qubes-ip)
./zeronet.py --tor always --fileserver_ip 10.152.152.11
Configure Tor Browser to connect to localhost.
In Tor Browser type
about:config into the URL bar -> press
Enter -> search for
network.proxy.no_proxies_on -> Set to
Start Tor Browser.
Go to the ZeroNet web interface. Paste http://127.0.0.1:43110 into Tor Browser's url field and press enter.
Done. You can now use ZeroNet.
/usr/local/etc/onion-grater-merger.d/because that onion-grater settings folder is persistent in Qubes-Whonix TemplateBased ProxyVMs, i.e. Whonix-Gateway (commonly called
sys-whonix). Non-Qubes-Whonix users could also use
/etc/onion-grater-merger.d/. Qubes-Whonix users could also use
/etc/onion-grater-merger.d/but then users would have to make
/etc/onion-grater-merger.d/persistent, which would require doing this inside the Whonix-Gateway TemplateVM (commonly called
whonix-gw) and restart their Whonix-Gateway ProxyVM or to use bind-dirs. Both is more more complicated than simply using
/usr/local/etc/onion-grater-merger.d/which is persistent either way and even allows multiple Whonix-Gateway ProxyVMs based on the same Whonix-Gateway TemplateVM for lets say one Whonix-Gateway ProxyVM extending and relaxing onion-grater's whitelist and the other Whonix-Gateway ProxyVM with the default more restricted onion-grater whitelist.
https | (forcing) onion
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! See Conditions for Contributions to Whonix, then Edit! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.