"Document Installation and Setup of the New Security-focused Hardened Debian Linux Distribution" selected by Whonix for Season of Docs 2019

No, not that I know. But we could/should create a template {{kicksecure}}.



1 Like

Wiki templates support variables. But if we have to define the variable form the page that references the template we gain nothing.

Maybe mediawiki supports conditional variables so it would react based on the page being hosted in the Kicksecure/ hierarchy or something.

What do we do with pages such as

Such pages are not Whonix specific. At best “Kicksecure based” specific. Maybe Kicksecure based is a good concept to introduce to Whonix users?

  • Probably not worth it to turn all Whonix wiki pages into wiki templates. A lot work for just changing the project name.
  • Probably not worth re-inventing all pages and re-adding to the Kicksecure/ hierarchy.
  • So perhaps best to make such pages generic` Ii.e. unspecific to Whonix and valid for Kicksecure too. Perhaps avoiding saying either project name or if saying the project name list them both?

Yes. Good idea to start now. When answering forum questions as well. Its way to much work to start making changes all throughout Whonix.org until there are more regular contributors.

It might be a good idea to either create a page with a more detailed table about the differences between Whonix and Kicksecure. Or maybe create a template we could add to different Whonix, Kicksecure pages. Both would a good idea.

When looking for Kicksecure using a search engine most people will see Kicksecure is hosted on Whonix.org. Might cause a little confusion between the two projects. Wonder if it might be a good idea to add a link to Kicksecure/About on each Kickecure/$somepage for the time being?

I find the first paragraph a little confusing. Will have to rewrite that. → https://whonix.org/wiki/Kicksecure/About#Is_Kicksecure_an_Anonymity_Distribution_Like_Whonix.3F

Looking for ideas for the Kicksecure home page, not sure we should try to reinvent the wheel for the “JAZ”. Most project are using something like “Security Focused” or “Secure Browsing”. But for content lower on the page it might be a good idea to leverage whats been in the media over the last few years about breaches in major free email providers. (just some ideas)

  • People can create unbreakable passwords for each account they have.
  • Possible to clean malware viruses from their system without expensive anti-virus software (VirtualBox snapshots, Qubes DispososableVMs etc)
  • Hardened to prevent compromise.
  • Maybe add a link to a page such as this?: https://www.dailydot.com/debug/most-secure-operating-system/
1 Like

Moving some content from https://whonix.org/wiki/Kicksecure to an Kicksecure/features-and-advantages page. Using sdwdate for Kicksecure time source isn’t really about mitigating time-skew attacks? More for something like rollback attacks?

EDIT: Answered my own question.


1 Like

A post was split to a new topic: Move open-link-confirmation for Kicksecure?

First half of Kicksecure/Features completed.


1 Like

Is there anything from https://whonix.org/wiki/Kicksecure#Vision that will be added to Kicksecure by default (that can be added to Kicksecure/Features page)?

1 Like

Edit: Will spectre / meltdown resistant be enabled by default? Or is this a TODO?

Moved up to already implemented stuff already just now.

Edit: Will spectre / meltdown resistant be enabled by default? Or is this a TODO?

VirtualBox: unclear, that mess causes by upstream is documented here: https://www.whonix.org/wiki/Spectre_Meltdown#VirtualBox

Other platforms: Not vulnerable. Documented here, same as here: https://www.whonix.org/wiki/Spectre_Meltdown

1 Like

Applies to Kicksecure? (Whonix is based on Kicksecure)

1 Like

Additional content added to Kicksecure/Features.


1 Like

Need to wait for Kicksecure being considered relevant enough for Wikipedia by Wikipedia.

1 Like
1 Like

A post was split to a new topic: Kicksecure - List of Packages?

Crytopgraphic tools added.


1 Like

* Local user data is protected by Linux Unified Key Setup ([https://gitlab.com/cryptsetup/cryptsetup/wikis/home LUKS]) which uses strong encryption to safe-guard your information.See when [[Full Disk Encryption]] can – and can not --protect your data.

Sounds like that would be done by default. This isn’t a default. Actually quite difficult to encrypt a VM in-place.

(Related: https://www.whonix.org/wiki/Encrypted_Images)

New wiki pages:

Most of them non-functional. Working on it.

1 Like

See your point. Makes it sound like data is automatically protected.

1 Like

Should be good enough for initial release now.

1 Like
[Imprint] [Privacy Policy] [Cookie Policy] [Terms of Use] [E-Sign Consent] [DMCA] [Contributors] [Investors] [Priority Support] [Professional Support]