Long Wiki Edit Thread

Good work 0brand :slight_smile: Those who have technical skills and can write sensibly are rare.

I put all the BitMessage stuff on its own page (which it deserves & because of length) and put you as maintainer. Hope that is okay. Did some small edits too (I think your last two recorded edits were missed by me e.g. pic update etc).

On second thought, its not a big enough deal to worry about.

A little more cleaning up to do on the Email page and it will be done.

2 Likes

A few pages have been update. Minor edit mostly.

Considering I quite literally knew nothing and couldn’t write worth shit when I starting visiting Whonix.org. My tech skill and writing ability can be attributed to having great teachers. Some of the best IMO :wink:

Sounds good to me. :slight_smile:

2 Likes

On Screenshots of Common Whonix Activities the gpg import and config screenshots don’t really belong there. The Screenshots of Common Whonix Activities page should just showcase what is possible with Whonix. Not detail instructions.

2 Likes

Email Overview → All fixed

Yes, some re-organization is required in this area for the main ToC and that Email section of the ToC in general.

We should be adding BitMessage and some others explicitly.

1 Like

OK, I can fix the Mixmaster page next.

I see the Dev/Mixmaster page has most of the proper installation / config etc settings, so why don’t I use all the good info from that page, merge with the main Mixmaster page, then you can later delete that Dev page?

I presume those instructions are still functional? Never played with it before.

Also, I gather all Re-mailers are not traditional email, so I put them under “alternatives” (since that is how they are described on the Email Overview page). Better split on ToC that way.

Basically all the wiki up to Anonymous Email section is tight now, so would like to keep editing from there down. Exception:

  • “Testers” page - maybe 0brand and I can work through all the missing steps / instructions?
  • Also, we should finish off the DispVM page as a priority, as it is a bit of a mess.

Actually, I see 0brand had already cleaned up a lot of that page since I last had a look. :slight_smile:

Just did normal nit edits etc. Looks pretty good now, except for some TODOs (x3 I think).

I can do that :slight_smile: Maybe make instructions a little easier for less experienced users to follow. The more testers we have all the better for development.

Um..yes it was me :lying_face: I put a lot of hard work into that page :lying_face::lying_face:

I’ll start on the Qubes/DispVM first since it only has a few TODOs to complete.

I’ve also been working on sys-whonix DispVMs with persistent entry guards. Created using the instructions you and I authored for Service VMs (Qubes Docs). I’m hesitant to post until I have testing/research completed. In the past I posted DispVM hacks that were not safe to use but some forum members still insisted on using and even recommending to other users after Patrick asked then not to.

1 Like

torjunkie:

OK, I can fix the Mixmaster page next.

I see the Dev/Mixmaster page has most of the proper installation / config etc settings, so why don’t I use all the good info from that page, merge with the main Mixmaster page, then you can later delete that Dev page?

Dev/Mixmaster is just dev notes. /Mixmaster should be ok as is content wise.

I presume those instructions are still functional? Never played with it before.

Also, I gather all Re-mailers are not traditional email, so I put them under “alternatives” (since that is how they are described on the Email Overview page). Better split on ToC that way.

Basically all the wiki up to Anonymous Email section is tight now, so would like to keep editing from there down. Exception:

Alright. :slight_smile:

1 Like

Yes please - that would be great.

Missing technical steps is your thing :slight_smile:

Another one you might like to try is the Qubes Split Tor Browser, which is the solo empty entry in the Tor Browser section (thus annoying :wink: )

Also technical and right up your alley?

Then there are no pages in the top third (or so) of the ToC that have big missing sections.

2 Likes

we should have documentation about XMPP/Jabber , as we now include CoyIM by default in whonix.

once someone can write about it , then update here:


needs new screeshot:

as im having a problem with running whonixcheck, then one of you if possible can upgrade it.

2 Likes

I can do those as well, Qubes Split Tor Browser is something I’ve been wanting to have a go at for a while. :slight_smile:

2 Likes

What screenshot are you replacing?

1 Like

Could you review Wiki History please? @HulaHoop

im not replacing the screenshot , i want someone to replace it.

We need to make a page about Mac Hosts similar to Windows Hosts.

Mac Hosts page can be filled from info here.

Not sure we gain much by importing other pages. We don’t really have anyone to maintain Microsoft Windows Hosts either. It exists now and has some info but no one really working on it actively (engage with community, capability to debate/clarify).

Coming to mind perhaps wanting to improve Apple's Operating Systems are Malware - GNU Project - Free Software Foundation would be @torjunkie. But I leave it to the volunteer to decide if that is a good/fun use of time.

1 Like

Hi Patrick

I agree pages could use an update (Qubes/Uninstall, new page Reinstall TemplateVM R4.0) I have a few thing to finish then I’ll start on this.

P.S Install whonix-gw-13 from backup to reproduce behavior from the following issue didn’t produce anything yet. Will try again.

https://forums.whonix.org/t/tor-error-your-tor-config-file-contains-at-least-one-error/6200/5

2 Likes

Changes rejected. Reasons:

  • Factually incorrect. Implies properly implemented IPSec, TLS and SSH is vulnerable to MITM attack if router is infected and that is not true. These protocols are resilient in face of untrusted middle nodes across the internet.

  • Not directly relevant to Whonix. Whonix security does not depend on whether your router is safe or not - therefore does not deserve such depth. In many cases you don’t have a choice in the software your network uses because it is not your network if you are on the go.

  • Even with a safe router, you are still hosed if family members run untrusted devices with proprietary spyware like Windows or out-of-the-box Android ROMs.

  • Implies you can be safe from targeted attacks - practically impossible in face of the adversaries mentioned and therefore false.

  • A laundry list of NSA/GCHQ tooling when the phrase “software or hardware implants” will do.

I think this page should say off the shelf routers should not be considered trusted and leave it at that. This means deprecating these sections.

The whole router/Wifi hardening guide is kinda pointless considering this. FOSS firmware recommendations are welcome. Open Hardware DIY guides, even better.