Should Whonix host be fully torified by default?

I see.

I was contemplating that.

This goes back to the question: what would users expect from a Whonix-Host? Does something called Whonix-Host generate the impression, that all VMs and all applications running on such a host are torified by default? I guess Should Whonix-Host have any features besides hosting Whonix VMs in a secure way? will tell.

In that case users might shoot their own feet with a Kicksecure VM?
This is specifically bad since SecBrowser in Kicksecure is still branded as “Tor Browser” (as rebranding seems not possible in an easy, reliable way without recompilation which would be too much effort).

This would lead to confusion for sure if not gotten right. Tails renamed their captive portal solution Unsafe Browser to make that clear and then users still use it for all sorts of stuff.

Also not sure yet how that would influence Whonix-Host firewall. Some VMs no connectivity (Whonix-Workstation), some VMs Tor-only connectivity (Whonix-Gateway), some VMs clearnet connectivity (Kicksecure). Related:

That was always possible. Calling it Kicksecure or not. In that case,

If Kicksecure doesn’t become an end-product for users then there’s little need for it. Was the idea behind Kicksecure. Debian based security (invented as “by-product” of Whonix development) but without focus on anonymity/privacy.

1 Like