This comes in three parts…
Part I
As noted by Patrick:
Pages in question:
https://www.whonix.org/wiki/Computer_Security_Education
https://www.whonix.org/wiki/Post_Install_Advice
https://www.whonix.org/wiki/Security_Guide
https://www.whonix.org/wiki/Download
https://www.whonix.org/wiki/Advanced_Security_Guide
I supposed that steps in Computer Security Education, Post Install Advice and Security Guide should be realistic to be applied by mortals. Advanced Security Guide is supposed to contain the hardcore stuff requiring more skill.
In Security Guide, the Anonymous 3G modem and Anonymous WiFi adapter chapters don’t really fit. From a logical flow it would fit better in Computer Security Education, but realistically it probably better fits into Advanced Security Guide. Maybe a section in Pre Install Advice that only addresses advanced users would be best.
Here are the contents of these pages as they stand right now. Suggesed changes will be in the next forum post. I’ve made a few comments after each one.
CURRENT TOCs FOR THESE ENTRIES
POST INSTALL ADVICE / POST-INSTALLATION SECURITY ADVICE
On Whonix-Gateway and Whonix-Workstation
Change Passwords
Security Updates
Network Time Syncing
Security Guide
Footnotes
Note: 1 x remaining TODO (document network time syncing in terminal).
COMPUTER SECURITY EDUCATION
Introduction
General
Safer Upgrades
Tor Browser
Host Security
Core Dumps
Security and Privacy Risks
Malware
Firmware Trojans
Avoid Out-of-band Management Features
Out-of-band Management Design
Out-of-band Management Functionality
Exploitation Risk
General Privacy and Security Concerns
Hardware Recommendations
Avoid Other Out-of-band Features
Using a Dedicated Host Operating System and Computer
Using Whonix on External Media
Using a Non-shared Host
Firmware Updates
Firmware on Personal Computers
Firmware Updating and Security Problems
Using Open-source Hardware
Hardware Trust in Modern Computing
Open-source Hardware Alternatives
ARM-based Platforms
Open-source Processors
Final Hardware Purchase
Buyer Considerations
Firmware Considerations
Host Operating System
Windows Hosts
Windows as Malware
Windows Analysis
MacOS Hosts
GNU/Linux Hosts
Recommended GNU/Linux Distribution
Router and Local Area Network Security
The State of Router Insecurity
Suitable Hardware and Router Configurations
Accessing Router Settings
Linux
Windows
macOS
Recommended Router Settings
General Router Settings
Wireless Network Router Settings
Router Firmware
Host Firewall
Disable TCP Timestamps
Qubes
Linux
Windows
Other Operating Systems
Disable ICMP Timestamps
Qubes
Linux
Windows
Other Operating Systems
Microphones
KVM
VirtualBox
Qubes
Webcams
Wireless Input Devices
Backups
Whonix information
MAC Address
Introduction
Using a Home Connection
Using a Public Computer
Using a Personal Computer in a Public Network
Random MAC Addresses
Auto-connect Risk
Changing MAC Addresses
For Qubes Hosts
For Linux Hosts
For Windows Hosts
For MacOS Hosts
Sources
Known Bugs
Greater Security and Next Steps
References
License
Note: 3 x TODO’s oustanding
- Disable TCP timestamps instructions for other OSes other than Mac, Windows, Linux
- Disable ICMP timestamps instructions for other OSes other than Mac, Windows, Linux, OpenBSD
- Help to test and expand MAC Address spoofing on Linux hosts
Also note that this is far too big for a single page. Basically another main (bold) wiki entry on the main ToC with the breaking down of main chunks into sub-entries is far more reader-friendly and sensible.
Also needs stuff with discrete steps to be pulled into security guides.
SECURITY GUIDE
> Basics
Motivation
Virtualization Platform
Type 1 vs Type 2 Hypervisors
Qubes-Whonix vs Physically-Isolated Non-Qubes-Whonix
Qubes-Whonix Hardware Requirements
VirtualBox Hardening
Operating System
Updates
Updating with Extra Care
Installing Additional Software
Whonix-Gateway Security
General
Seccomp
Tor Connection Padding
AppArmor
Warning: Bridged Networking
Host Security
Basics
Power Saving Considerations
Hardware Component Risks
Anonymous Mobile Modems
Anonymous WiFi Adapters
Hardening
Whonix-Workstation Security
Introduction
AppArmor
Firejail
Introduction
Installing Firejail
Sandboxing Tor Browser
Running Firefox-ESR in a Firejail Sandbox (Qubes Debian Template)
VM Snapshots
Adding a NAT Adapter to Whonix-Workstation / Updates without Tor
Adding a Host-Only Networking Adapter to Whonix-Workstation / SSH into Whonix-Workstation
Onionizing Repositories
Whonix and Debian Packages
Qubes Packages
Passwords
Principles for Stronger Passwords
Generating Unbreakable Passwords
Transporting UDP Tunnels over Tor
Time Attacks
Tor Versioning
Verifying Software Signatures
What Digital Signatures Prove
Checking Digital Fingerprints of Signing Keys
Checking Digital Fingerprints of Signed Software
System Hardening Checklist
Stay Tuned
Advanced Security Guide
Footnotes
Note: no outstanding TODOs.
Far too long. Definitely any moderate-complex stuff there that needs to be shifted into the advanced guide.
Again, probably better to have a Security Guide (bold) main page wiki entry, with sub-entries to break up its chunkiness.
DOWNLOAD
Only has the table with host os, recommendation of platform to install etc?
But probably under the Download Whonix section on main wiki page it would be better to list all the the links to Qubes, KVM, Virtualbox, and physical isolation directly under it.
ADVANCED SECURITY GUIDE
Also note that this is far too big for a single page. Basically another main (bold) wiki entry on the main ToC with the breaking down of main chunks into sub-entries is far more reader-friendly and sensible.
Basics
Network Time Synchronization
General
Spoof the Initial Virtual Hardware Clock Offset
Introduction
KVM
VirtualBox
Qubes
Summary
Deactivate Automatic TimeSync
Host Security
Whonix Platform
Hardening
Key Hardening Steps
Additional Defenses
apt-transport-tor
Torify apt-get Traffic
One VM Whonix Configuration
Separate VirtualBox User Account
DMZ
Host Firewall
Installation
Port Scan
NAT Router
Dedicated Connection
Filtering Ports
Introduction
Incoming
Outgoing
Tor Traffic Whitelisting Gateway
Hardware Security
Physical Attacks
Introduction
Full Disk Encryption
On the Host
Protection Against Powerful Adversaries
Extra Measures
Protection Against Lesser Adversaries
Advice for Solid-state Drives and USB Storage
Tips
Encrypted Guest Images
Full Disk Encryption within the Virtual Machine
Virtual Machine Files in an Encrypted Container
Other Security Considerations
Open Security Research Questions
Side Channel Attacks
Screen Lock
BIOS Password
Cold Boot Attacks
Preventative Measures
Evil Maid Attack
Problematic Interfaces
Operating System
About Debian
Debian Announcements
Harden Debian
Harden Software Repositories
Hardened Kernels
Vulnerabilities at Install Time
Introduction
Possible Solutions
apt-cache
apt-offline
Building from Source Code using Current Sources
Always Up-to-date Builds
Virtualization Platform
VirtualBox
Introduction
Secure Labeling
Qubes
Whonix-Workstation Security
Hardening
Introduction
AppArmor
More than One Tor Browser in Whonix
Using Multiple Whonix-Workstations
Second Optional (Extra) Firewall
Whonix-Gateway Security
Static VirtualBox IP
Disable Control Port Filter Proxy
Introduction
How
On Whonix-Gateway
Deactivate CPFP in Firewall
Deactivate CPFP
Deactivate whonixcheck CPFP Running Test
On Whonix-Workstation
Deactivate whonixcheck's Tor Bootstrap Test
Deactivate sdwdate-plugin-anon-shared-con-check
Tor Browser Updater
whonixcheck Hardening
Prevent Polluting TransPort
Prevent torproject.org Connections
Prevent Downloading Whonix News
Prevent Running apt-get
Prevent Autostart
Tor
Chaining Anonymizing Gateways
Useful External Links
Other important stuff
Footnotes
License
Note: 3 x TODOs
- Qubes random clock offset for Whonix VMs (not yet possible)
- Query whether virtualizers write VM Ram contents to disk when swap/crash dumps disabled
- How to uninstall sdwdate-plugin-anon-shared-con-check
Now how to fix…