Thank you very much for your clarify about Whonix-Workstation. Now I understand how it is working much better.
> 3. Use regular firefox in a debian/fedora based appVM connected to > sys-whonix (no tor over tor, and all traffic from the VM is routed > through tor, but it would be easier for adversaries to fingerprint you > because most tor users use tor browser, not firefox, so you're more > unique this way) Totally agree with all ways, but it has 1 more way about which I know: https://trac.torproject.org/projects/tor/ticket/15800 When you change on 'false' in network.proxy.socks_remote_dns TorBrowser setting. And this type of browsing you could use in a debian/fedora based appVM connected to sys-whonix. And it will be the same like in your 1 way (tor browser in a whonix-ws) without any fingerprint, because it is the same Tor Browser. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/03d56bf0-e982-4241-8790-57e2531f2856%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.