Added Screenshot Qubes-r4-create_sys-whonix.png to Template: Qubes Create Gateway ProxyVMs including content. (Using Admin privileges). Also, I failed to add a comment for the edits…again.
Its not prefs templates_for_dispvms true that prevents Tor Browser from starting.
Its the dvm tag in the VM name anon-whonix-dvm that prevents Tor Browser start.
User would have to create an AppVM without dvm appended to the name. Customize Tor Browser (Noscript, Tor Browser security slider, etc). Then clone the AppVM with dvm appended to the name of the new VM. Then continue with the instructions using the new VM.
Instructions have been updated
However, to start Tor Browser in a dvm, the instructions Patrick provided makes more sense IMO:
Could you please add somewhere advice on how to increase the quality of entropy pool? That would be advisable before sensitive cryptographic operations such as generating a gpg private key or crypto currency wallet / mnemonic seed etc. As I understand the linux kernel developers, the kernel entropy can never get worse even if users manage to produce no entropy at all.
Please check my edits to upgrade instructions. One of those Qubes packages is now in the stable repo, not the testing one (I fixed that). But could be other minor errors.
Could be good to double check since Whonix 14 has been announced.
I was contemplating to drop support for Qubes R3.2. Makes development a
lot harder / time consuming to keep compatibility with both in mind.
Suffering from sunken cost fallacy.
Sounds reasonable with only 6 months left on that anyway.
PS Whonix 14 upgrade seems ok. However:
Steps for install qubes-whonix-workstation (and gateway) are not necessary. They are already installed before that step.
Ditto the dom0 qubes-whonix-add-on (or whatever it’s called) - it’s already installed somewhere before that step.
The qubes salt stuff to create the anon-whonix didn’t work for me (similar to mig5 from memory). Had to manually create one from Qubes Manager. I trust that is safe with anon-vm tags now (?) If not, how to check for tags etc?
Sounds reasonable with only 6 months left on that anyway.
PS Whonix 14 upgrade seems ok. However:
Steps for install qubes-whonix-workstation (and gateway) are not necessary. They are already installed before that step.
Confirmed. Should be kept anyhow. This is only a safeguard to make sure Whonix distribution defaults as far as default package selection are enforced. Will only matter for users who previously uninstalled a Whonix meta package.
Ditto the dom0 qubes-whonix-add-on (or whatever it’s called) - it’s already installed somewhere before that step.
Right, it is now a dependency of qubes-mgmt-salt-dom0-virtual-machines. Therefore can be removed.
The qubes salt stuff to create the anon-whonix didn’t work for me (similar to mig5 from memory). Had to manually create one from Qubes Manager.