No, not that I know. But we could/should create a template {{kicksecure}}.
Wiki templates support variables. But if we have to define the variable form the page that references the template we gain nothing.
Maybe mediawiki supports conditional variables so it would react based on the page being hosted in the Kicksecure/
hierarchy or something.
What do we do with pages such as
- Safely Use Root Commands
- System Recovery using SysRq Key
- Point Release - Kicksecure
- and many others.
Such pages are not Whonix specific. At best “Kicksecure based” specific. Maybe Kicksecure based
is a good concept to introduce to Whonix users?
- Probably not worth it to turn all Whonix wiki pages into wiki templates. A lot work for just changing the project name.
- Probably not worth re-inventing all pages and re-adding to the
Kicksecure/
hierarchy. - So perhaps best to make such pages generic` Ii.e. unspecific to Whonix and valid for Kicksecure too. Perhaps avoiding saying either project name or if saying the project name list them both?
Yes. Good idea to start now. When answering forum questions as well. Its way to much work to start making changes all throughout Whonix.org until there are more regular contributors.
It might be a good idea to either create a page with a more detailed table about the differences between Whonix and Kicksecure. Or maybe create a template we could add to different Whonix, Kicksecure pages. Both would a good idea.
When looking for Kicksecure using a search engine most people will see Kicksecure is hosted on Whonix.org. Might cause a little confusion between the two projects. Wonder if it might be a good idea to add a link to Kicksecure/About on each Kickecure/$somepage
for the time being?
I find the first paragraph a little confusing. Will have to rewrite that. → https://whonix.org/wiki/Kicksecure/About#Is_Kicksecure_an_Anonymity_Distribution_Like_Whonix.3F
Looking for ideas for the Kicksecure home page, not sure we should try to reinvent the wheel for the “JAZ”. Most project are using something like “Security Focused” or “Secure Browsing”. But for content lower on the page it might be a good idea to leverage whats been in the media over the last few years about breaches in major free email providers. (just some ideas)
- People can create unbreakable passwords for each account they have.
- Possible to clean
malwareviruses from their system without expensive anti-virus software (VirtualBox snapshots, Qubes DispososableVMs etc) - Hardened to prevent compromise.
- Maybe add a link to a page such as this?: https://www.dailydot.com/debug/most-secure-operating-system/
Moving some content from https://whonix.org/wiki/Kicksecure to an Kicksecure/features-and-advantages page. Using sdwdate for Kicksecure time source isn’t really about mitigating time-skew attacks? More for something like rollback attacks?
EDIT: Answered my own question.
A post was split to a new topic: Move open-link-confirmation for Kicksecure?
First half of Kicksecure/Features completed.
https://whonix.org/w/index.php?title=Kicksecure/Features&oldid=51207&diff=cur
Is there anything from https://whonix.org/wiki/Kicksecure#Vision that will be added to Kicksecure by default (that can be added to Kicksecure/Features page)?
Edit: Will spectre / meltdown resistant be enabled by default? Or is this a TODO?
Moved up to already implemented stuff already just now.
Edit: Will spectre / meltdown resistant be enabled by default? Or is this a TODO?
VirtualBox: unclear, that mess causes by upstream is documented here: Spectre Meltdown - Whonix
Other platforms: Not vulnerable. Documented here, same as here: Spectre Meltdown - Whonix
Applies to Kicksecure? (Whonix is based on Kicksecure)
Additional content added to Kicksecure/Features.
https://whonix.org/w/index.php?title=Kicksecure/Features&oldid=51209&diff=cur
Need to wait for Kicksecure being considered relevant enough for Wikipedia by Wikipedia.
A post was split to a new topic: Kicksecure - List of Packages?
Crytopgraphic tools added.
https://whonix.org/w/index.php?title=Kicksecure/Features&oldid=51221&diff=cur
* Local user data is protected by Linux Unified Key Setup ([Home · Wiki · cryptsetup / cryptsetup · GitLab LUKS]) which uses strong encryption to safe-guard your information.See when [[Full Disk Encryption]] can – and can not --protect your data.
Sounds like that would be done by default. This isn’t a default. Actually quite difficult to encrypt a VM in-place.
(Related: Encrypted VM Images)
New wiki pages:
- Template:Kicksecure Choose Stable - Whonix
- https://www.whonix.org/wiki/Template:Kicksecure_download
- Download Kicksecure ™ (FREE)
- Kicksecure ™ for VirtualBox with Xfce
- Kicksecure ™ for VirtualBox with CLI
Most of them non-functional. Working on it.
See your point. Makes it sound like data is automatically protected.
Should be good enough for initial release now.