Install Tor Browser on Debian, Kicksecure or Qubes using Tor Browser Downloader (by Whonix developers)
- A) Installation of Tor Browser on Whonix: Tor Browser is installed by default in Whonix. For more information and re-installtion, see the Tor Browser wiki page.
- B) Installation of Tor Browser using tb-updater (by Whonix developers) for Debian, Kicksecure, or Qubes: See this wiki page.
Introduction[edit]
Various wiki sections recommend that a functional Tor Browser instance is maintained outside of the Whonix platform. This is useful in various cases:
- Should Whonix ever break, it is possible to search for a solution anonymously.
- System-wide Tor problems can be easily detected by testing connectivity outside of Whonix.
- Certain Tor / Tor Browser activities are difficult (or impossible) to configure in Whonix, but are much easier in the standard configuration. [1]
In Non-Qubes-Whonix, it is recommended to have Tor Browser installed on the Linux / macOS / Windows host platform. In Qubes-Whonix™, it is recommended to install Tor Browser in a debian-12
, debian-12-minimal
or kicksecure
App Qube (advanced users).
Note: If an expired key signature message like below appears, the steps in this chapter must be performed again due to an update of the Whonix signing key; see Expired key signature.
The following signatures were invalid: EXPKEYSIG CB8D50BB77BB3C48 Patrick Schleizer adrelanos@whonix.org
Easy[edit]
All Platforms: Manual Tor Browser Download[edit]
Follow these instructions to manually download Tor Browser with Firefox-ESR via the available onion service. This method is not anonymous, unless Qubes-Whonix users temporarily set sys-whonix
as the NetVM for the non-Whonix App Qube.
Debian Linux Hosts[edit]
Tor Browser can optionally be downloaded utilizing the tb-updater
software package by Whonix developers. By default the download does not occur over Tor, meaning it is not anonymous.
1. Download the Signing Key.
wget https://www.whonix.org/derivative.asc
2. Optional: Check the Signing Key for better security.
3. Add Whonix signing key.
sudo cp derivative.asc /usr/share/keyrings/derivative.asc
4. Whonix APT repository choices.
Optional: See Whonix Packages for Debian Hosts and Whonix Host Enhancements instead of the next step for more secure and complex options.
5. Add Whonix APT repository.
echo "deb [signed-by=/usr/share/keyrings/derivative.asc] https://deb.whonix.org trixie main contrib non-free" | sudo tee /etc/apt/sources.list.d/derivative.list
5. Update the package lists.
sudo apt update
6. Install tb-updater
.
sudo apt install tb-updater
Moderate: QubesOS[edit]
Summary of instructions of Qubes OS. Details below. These instructions:
- Anonymously retrieve and verify the Whonix signing key.
- Copy the Whonix signing key to a debian-12 (
debian-12-tor
) or debian-12-minimal (debian-12-minimal-tor
) Template clone. - Add the Whonix signing key to the list of trusted keys.
- Install apt-transport-tor in the
debian-12-tor
/debian-12-minimal-tor
Template. - Add the Whonix APT repository.
- Install
tb-updater
from the Whonix repository. - Create a
debian-tor-browser
/debian-minimal-tor-browser
App Qube based on the Template clone.
The debian-12-minimal
template provides a smaller attack surface, but is recommended for advanced users. Several package prerequisites are required for full functionality; see footnote. [2] [3]
Clone the Template[edit]
In Qube Manager: Right-click debian-12 or debian-12-minimal template
→ Clone qube
→ Rename to debian-12-tor or debian-12-minimal-tor
anon-whonix Steps[edit]
Run the following commands in anon-whonix
terminal. Advanced users can utilize a Whonix DispVM instead in this section.
1. Download the Whonix signing key.
curl --tlsv1.3 --proto =https --max-time 180 --output derivative.asc https://www.whonix.org/derivative.asc
2. Display the key fingerprint.
gpg --keyid-format long --import --import-options show-only --with-fingerprint derivative.asc
3. Verify the Whonix signing key fingerprint.
Compare the fingerprint to the one found here. The most important check is confirming the fingerprint exactly matches the output below. [4]
Key fingerprint = 916B 8D99 C38E AF5E 8ADC 7A2A 8D66 066A 2EEA CCDA
The message gpg: key 8D66066A2EEACCDA: 104 signatures not checked due to missing keys
is related to the The OpenPGP Web of Trust. Advanced users can learn more about this here.
4. Rename the Whonix signing key to a temporary derivative.asc
file.
mv derivative.asc /tmp/derivative.asc
5. Copy the derivative.asc
text file to the debian-12-tor
or debian-12-minimal-tor
Template.
qvm-copy /tmp/derivative.asc
When prompted, choose either the debian-12-tor
or debian-12-minimal-tor
Template.
Template Steps[edit]
Complete the following steps in debian-12-tor
or debian-12-minimal-tor
terminal.
1. Add the Whonix signing key to the list of trusted keys.
sudo cp ~/QubesIncoming/anon-whonix/derivative.asc /usr/share/keyrings/derivative.asc
2. Add the Whonix stable APT repository. [5] [6]
echo "deb [signed-by=/usr/share/keyrings/derivative.asc] https://deb.whonix.org bookworm main contrib non-free" | sudo tee /etc/apt/sources.list.d/derivative.list
3. Update the package lists.
sudo apt update
4. Install tb-updater
by Whonix.
sudo apt install tb-updater
Note: This step will correctly install tb-updater
and should also automatically download Tor Browser. If that does not occur, complete steps 2 to 4 below after creating an App Qube.
App Qube Steps[edit]
1. Create an App Qube based on the debian-12-tor
or debian-12-minimal-tor
Template.
In Qube Manager: Left-click Qube
→ Create new qube
Use the following settings:
- Name and label: debian-tor-browser or debian-minimal-tor-browser
- Type: App Qube
- Template: debian-12-tor or debian-12-minimal-tor
- Networking: default (sys-firewall)
2. Optional: Temporarily set sys-whonix
as the NetVM for the Debian App Qube.
If Tor Browser was not downloaded at step 5 in the previous section, complete steps 2 to 4.
In Qube Manager: Right-click debian-tor-browser
or debian-minimal-tor-browser
→ Qube settings
→ Networking
→ Select sys-whonix
→ OK
3. Optional: Download Tor Browser.
In terminal, run.
update-torbrowser --input gui
4. Optional: Revert the networking setting to sys-firewall
in Qube Manager.
5. Launch Tor Browser from the App Qube menu and check it is functional.
Note: Tor Browser can be kept up-to-date using Tor Browser's internal updater. It is not necessary to run the update-torbrowser command again.
Figure: Tor Browser in Qubes' debian-minimal-tor-browser
App Qube
Footnotes[edit]
- ↑ For example, the Snowflake pluggable transport client is currently experimental in Whonix.
- ↑ At the time of writing the Qubes documentation and forums suggest the following essential packages for browsing purposes:
- qubes-core-agent-passwordless-root
- qubes-core-agent-networking
- pulseaudio-qubes
- qubes-core-agent-nautilus
- nautilus
- zenity
- gnome-keyring
- policykit-1
- libblockdev-crypto2
- ↑ Also see automate debian-minimal based template creation
- ↑ Minor changes in the output such as new uids (email addresses) or newer expiration dates are inconsequential.
- ↑ Alternatively use the stable onion APT repository: echo "deb [signed-by=/usr/share/keyrings/derivative.asc] http://deb.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion bookworm main contrib non-free" | sudo tee /etc/apt/sources.list.d/derivative.list
- ↑
Note:
tor+http
does not work in this configuration.
We believe security software like Whonix needs to remain open source and independent. Would you help sustain and grow the project? Learn more about our 12 year success story and maybe DONATE!