Thank you very much for your clarify about Whonix-Workstation. Now I understand 
how it is working much better.


> 3. Use regular firefox in a debian/fedora based appVM connected to
> sys-whonix (no tor over tor, and all traffic from the VM is routed
> through tor, but it would be easier for adversaries to fingerprint you
> because most tor users use tor browser, not firefox, so you're more
> unique this way)

Totally agree with all ways, but it has 1 more way about which I know:
https://trac.torproject.org/projects/tor/ticket/15800

When you change on 'false' in network.proxy.socks_remote_dns TorBrowser setting.

And this type of browsing you could use in a debian/fedora based appVM 
connected to sys-whonix. And it will be the same like in your 1 way (tor 
browser in a whonix-ws) without any fingerprint, because it is the same Tor 
Browser.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/03d56bf0-e982-4241-8790-57e2531f2856%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to