[HOME] [DOWNLOAD] [DOCS] [NEWS] [SUPPORT] [TIPS] [ISSUES] [CONTRIBUTE] [DONATE]

Long Wiki Edits Thread

How can I be sure I’ll like Whonix ™?

new wiki chapters:

updated:

new:

new wiki chapter:
https://www.whonix.org/wiki/Onion_Services#OnionBalance

new wiki page:

new wiki chapter:
Wiki is the Primary Source of Information vs Forums

New wiki page:

Equivalent:

Please edit Kicksecure ™ Website API (application programmable interface) only as it will be automatically mirrored to Whonix ™ API (application programmable interface) at a later time.

This is thanks to the MultiWiki feature which of course is only opt-in for wiki pages where automatic mirroring from Kicksecure to Whonix is appropriate.

Suggested nit fix on Whonix main page: www.whonix.org (http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion/).

The rest of the page looks good IMO.

[] = embedded wiki link

Current:

10 Years of Success

We have protected our users against [Real World Attacks] with a long [10 years history of success]. We’re always working to improve Whonix for the next 10 years of privacy and security with Whonix.

Suggested:

10 Years of Success

We have successfully protected our users against [Real World Attacks] for [more than 10 years]. With the next decade in mind, we are constantly improving Whonix privacy and security.

A similar change is recommended on the Kicksecure main page: www.kicksecure.com (http://www.w5j6stm77zs6652pgsij4awcjeel3eco7kvipheu6mtr623eyyehj4yd.onion/)

[] = embedded wiki link

Current:

10 Years of Success

By the same developers as [Whonix] who have a [10 years history of success] protecting our users against [Real World Attacks].

Suggested:

10 Years of Success

Created by the same developers of [Whonix], who have successfully protected users against [Real World Attacks] for [more than 10 years].

1 Like

Difference between revisions of "Kicksecure-Qubes Security" - Kicksecure

Thanks! Homepage changes have been applied just now.

Updated https://www.kicksecure.com/wiki/VirtualBox/Troubleshooting#VirtualBox_Generic_Bug_Reproduction.

new wiki chapters:

new wiki page:

Wiki editing without account has been disabled. Hopefully it’s only temporary. The reason is an upstream but with MediaWiki extension FlaggedRevisions.

(Technical background: ⚓ T312708 Cannot update the schema of flaggedtemplates table from 1.37 to 1.38 required deleting the whole database of FlaggedRevisions to be able to update the wiki. Now ⚓ T313367 Allow API editing and mediawiki-shell scripting is required to re-enable Flagged Revisions on all wiki pages.)

I very much want to keep wiki editing without account supported. Over the years, lots of contributions were done without requirement the extra burden from causal editors to create an account. Let’s hope that it can be fixed an wiki editing without account soon be re-enabled.

Editing while logged in with account is still possible.

This issue has been resolved. Wiki editing again possible without account.

Worth mentioning these on the Qubes-Whonix security page for advanced users?

1. Suricata

Looks like it replaces the sys-firewall and does packet inspection (IDS, IPS) to look for malicious traffic. Larger project has been around since 2009.

https://github.com/control-owl/suriGUI

Suricata: What is it and how can we use it - Infosec Resources

Suricata is an open-source detection engine that can act as an intrusion detection system (IDS) and an intrusion prevention system (IPS). It was developed by the Open Information Security Foundation (OSIF) and is a free tool used by enterprises, small and large. The system uses a rule set and signature language to detect and prevent threats. Suricata can run on Windows, Mac, Unix and Linux.

As discussed in the previous articles, intrusion detection “detects” and “alerts” a threat. In contrast, an intrusion prevention system also takes action on the event and attempts to block the traffic. Suricata can do both and also does well with deep packet inspection. Making it perfect for pretty much any kind of standard security monitoring initiatives your company might have.

See also:

Features - Suricata
ANN: sys-ips - 4.1 - Qubes OS Forum

2. Pi-hole network-level advertisement and Internet tracker blocking application

https://docs.pi-hole.net/

The Pi-hole® is a DNS sinkhole that protects your devices from unwanted content, without installing any client-side software.

Easy-to-install: our versatile installer walks you through the process and takes less than ten minutes
Resolute: content is blocked in non-browser locations, such as ad-laden mobile apps and smart TVs
Responsive: seamlessly speeds up the feel of everyday browsing by caching DNS queries
Lightweight: runs smoothly with minimal hardware and software requirements
Robust: a command-line interface that is quality assured for interoperability
Insightful: a beautiful responsive Web Interface dashboard to view and control your Pi-hole
Versatile: can optionally function as a DHCP server, ensuring all your devices are protected automatically
Scalable: capable of handling hundreds of millions of queries when installed on server-grade hardware
Modern: blocks ads over both IPv4 and IPv6
Free: open-source software which helps ensure you are the sole person in control of your privacy

See also:

How to configure PiHole in QubesOS (ProxyVM) | Patrizio Tufarolo

https://github.com/92VV3M42d3v8/PiHole/blob/master/PiHole%20Cloudflared

Pi-hole as additional ad-firewall and (unbound) DNS within Qubes - General Discussion - Qubes OS Forum

Pi-hole configuration qubes os 4.1 - User Support - Qubes OS Forum

1 Like

Since for advanced users, sure, the user could check that out. Just a hint.

[Imprint] [Privacy Policy] [Cookie Policy] [Terms of Use] [E-Sign Consent] [DMCA] [Contributors] [Investors] [Priority Support] [Professional Support]