"Document Installation and Setup of the New Security-focused Hardened Debian Linux Distribution" selected by Whonix for Season of Docs 2019

Moving some content from https://whonix.org/wiki/Kicksecure to an Kicksecure/features-and-advantages page. Using sdwdate for Kicksecure time source isn’t really about mitigating time-skew attacks? More for something like rollback attacks?

EDIT: Answered my own question.

https://www.whonix.org/wiki/Dev/TimeSync

1 Like

A post was split to a new topic: Move open-link-confirmation for Kicksecure?

First half of Kicksecure/Features completed.

https://whonix.org/w/index.php?title=Kicksecure/Features&oldid=51207&diff=cur

1 Like

Is there anything from https://whonix.org/wiki/Kicksecure#Vision that will be added to Kicksecure by default (that can be added to Kicksecure/Features page)?

1 Like

Edit: Will spectre / meltdown resistant be enabled by default? Or is this a TODO?

Moved up to already implemented stuff already just now.

Edit: Will spectre / meltdown resistant be enabled by default? Or is this a TODO?

VirtualBox: unclear, that mess causes by upstream is documented here: Spectre Meltdown - Whonix

Other platforms: Not vulnerable. Documented here, same as here: Spectre Meltdown - Whonix

1 Like

Applies to Kicksecure? (Whonix is based on Kicksecure)

1 Like

Additional content added to Kicksecure/Features.

https://whonix.org/w/index.php?title=Kicksecure/Features&oldid=51209&diff=cur

1 Like

Need to wait for Kicksecure being considered relevant enough for Wikipedia by Wikipedia.

1 Like
1 Like

A post was split to a new topic: Kicksecure - List of Packages?

Crytopgraphic tools added.

https://whonix.org/w/index.php?title=Kicksecure/Features&oldid=51221&diff=cur

1 Like

* Local user data is protected by Linux Unified Key Setup ([Home · Wiki · cryptsetup / cryptsetup · GitLab LUKS]) which uses strong encryption to safe-guard your information.See when [[Full Disk Encryption]] can – and can not --protect your data.

Sounds like that would be done by default. This isn’t a default. Actually quite difficult to encrypt a VM in-place.

(Related: Encrypted VM Images)

New wiki pages:

Most of them non-functional. Working on it.

1 Like

See your point. Makes it sound like data is automatically protected.

1 Like

Should be good enough for initial release now.

1 Like

Kicksecure uses apt-transport-tor.

1 Like
1 Like
1 Like

Hi everyone,

With a heavy heart and due to personal reasons, I will not be able to complete this GSoD project in the required timeline. Patrick – both Lead Whonix developer and my GSoD mentor – and GSoD admins have been notified of my intention to discontinue with Kicksecure documentation development at this time. However, I Will be completing Kicksecure documentation in the near future upon my return.

I would like to thank every contributor that has helped both myself and Kicksecure developers and I look forward to completing my project. Just not under the GSoD umbrella.

0brand

2 Likes