Suggested fixes/improvements to the main Whonix page i.e. http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion/
1. Update the “Forum” and “News” links at the very top of the page to .onion links.
Every other link is onionzed right now i.e. Download, Wiki, FAQ etc. This provides consistency.
“Forum” link → change to: http://forums.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion/
“News” link → change to: http://forums.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion/c/news
2. Add the source references for the following quotes (consistency with other quotes that already do that).
”For the even more paranoid, there is a lesser-known Tor-enabled OS called Whonix”
wired.com
”Whonix is about as anonymous as an OS can get before it all becomes too inconvenient for normal use.”
theguardian.com
”Whonix, an operating system you can run in a virtual machine to maximize your online anonymity; it’s ideal for maintaining a secret identity.”
theintercept.com
”Whonix adds a layer of anonymity to your business tasks.”
techrepublic.com
3. Suggested/improved rewording.
Virus Protection
Additional security hardening measures and user education through Whonix provide better protection from viruses.
Change to:
Virus Protection
Whonix provides additional security hardening measures and user education to provide better protection from viruses.
History
An eight year history of protecting our users against Real World Attacks.
Change to:
History
Protecting our users against Real World Attacks for around a decade.
Fully auditable
You don’t have to trust our word that it respects and protects you. It is independently verifiable by security experts and software developers around the world. This improves security and privacy for everyone.
Change to:
Fully auditable
Whonix is independently verifiable by security experts and software developers around the world; you don’t have to trust developer claims. This improves security and privacy for everyone.
Complete respect for privacy
Your data always belongs to you, and only you. We don’t make advertising deals or collect sensitive personal data. We’re funded directly by our users paying what they want. And that’s how it should be.
Change to:
Complete respect for privacy
Whonix respects data privacy principles. We don’t make advertising deals or collect sensitive personal data. We’re funded directly by user contributions and that’s how it should be.
Warrant Canary
A canary confirms that no warrants have been served on the Whonix project.
Change to:
Warrant Canary
A canary confirms that no warrants have ever been served on the Whonix project.
Complete user freedom
There are no artificial restrictions on how users can reconfigure the system.
Change to:
Complete user freedom
No artificial restrictions are imposed on possible system configurations.
Digitally signed releases
Downloads are signed so you can verify they are genuine Whonix releases.
Change to:
Digitally signed releases
Downloads are signed so genuine Whonix releases can be verified.
Open Source
All of Whonix source code is licensed under OSI Approved Licenses. We respect the rights of our users. All of Whonix is available for review, scrutiny, modification, and redistribution by anyone. This improves security and privacy for everyone.
Change to:
Open Source
All the Whonix source code is licensed under OSI Approved Licenses. We respect user rights to review, scrutinize, modify, and redistribute Whonix. This improves security and privacy for everyone.
Research and Implementation Project
Be wary of those confidently calling themselves all-knowing, all-perfect. Whonix is an actively maintained research project making constant improvements – no shortcomings are ever hidden from users.
Change to:
Research and Implementation Project
Whonix makes modest claims and is wary of overconfidence. Whonix is an actively maintained research project making constant improvements; no shortcomings are ever hidden from users.
sandbox-app-launcher is an application launcher that can start each app inside its own restrictive sandbox. It runs each app as its own user, in a bubblewrap sandbox and confined by AppArmor.
Change to:
sandbox-app-launcher is an application launcher that can start each application inside its own restrictive sandbox. Each application runs as its own user, in a bubblewrap sandbox and confined by AppArmor.
enforce kernel module software signature verification
Change to:
Enforce kernel module software signature verification
deactivate malware after reboot from non-root compromise
Change to:
Deactivate malware after reboot from non-root compromise
post-quantum cryptography resistant signing of releases
Change to:
Post-quantum cryptography resistant signing of releases
multiple boot modes for better security (user, live, secureadmin, superadmin)
Change to:
Multiple boot modes for better security (user, live, secureadmin and superadmin)
4. Footer rewording (no need for arrows there; looks odd)
Whonix ™ is produced independently from the Tor® → anonymity software and carries no guarantee from The Tor Project → about quality, suitability or anything else.
Change to:
Whonix ™ is produced independently from the Tor® anonymity software and carries no guarantee from The Tor Project about quality, suitability or anything else.
5. Grammar nits.
Alternatively Debian, Kicksecure and perhaps other Debian based hosts can boot their existing host operating system into Host Live Mode.
Change to:
Alternatively Debian, Kicksecure and perhaps other Debian-based hosts can boot their existing host operating system into Host Live Mode.
Whonix ™ is based on Kicksecure ™ which is a a security-hardened Linux distribution.
Change to:
Whonix ™ is based on Kicksecure ™ which is a security-hardened Linux distribution.
Prevent de-anonymization of Tor onion services through Tirdad kernel module for random ISN generation.
Change to:
Prevent de-anonymization of Tor onion services via utilization of the Tirdad kernel module for random ISN generation.
Booting into VM Live Mode is a simple as choosing Live Mode in the boot menu.
Change to:
Booting into VM Live Mode is as simple as choosing Live Mode in the boot menu.