A Beginner Friendly Comprehensive Guide to Installing and Using A Safer Anonymous Operating System v1.0.2 A Beginner Friendly Comprehensive Guide to Installing and Using A Safer Anonymous Operating System

Version 1.1.3November, 2016

DOWNLOADABLE VERSIONS OF THIS GUIDE FOR OFFLINE USEDownload PDF Guide: {Tor Onion Address}GPG Verification Signature: Download {Tor Onion}GPG Key: 0xBD8083C5237F796BGPG Fingerprint: 6422 2A88 D257 3091 0C47 A904 BD80 83C5 237F 796B

UPDATE - February 20, 2016. A new email address, anonguide at vfemail, is currently in use for the guide. If you receive a confirmation email from it, do not be alarmed. The GPG public key is the same for the old bitmessage.ch address.

Web Table of Contents - Version 1.1.3

NOTE: The downloadable PDF link above is updated faster than the web version in this table of contents. If the version number for the "Web Table of Contents" does not match the version number under the Anonymous logo above, please use the PDF version.

Introduction

Chapter 1. The Initial Debian Setup and Install
Chapter 1A. Manual Download and Verification of Debian on Microsoft Windows
Chapter 1B. Manual Download and Verification of Debian on OS X.
Chapter 1C. Manual Download and Verification of Debian on Ubuntu.
Chapter 1D. Installing the Debian Host Operating System.

Chapter 2. Choosing your Installation Method
Chapter 2A. Installing an Operating System on an Encrypted USB Flash Drive.
Chapter 2B. Installing the Operating System on an Encrypted Internal Hard Drive Partition with a USB Flash Drive Boot Key.

Chapter 3. Final Debian Tweaks and Whonix Installation.

Chapter 4. Using Whonix Securely and Anonymously.
Chapter 4a. Proper Start Up and Shut Down Procedures for Whonix.
Chapter 4b. Using the Tor Browser.
Chapter 4c. Using a Password Manager.
Chapter 4d. Using the IRC and HexChat.
Chapter 4e. Using an Instant Messenger.
Chapter 4f. Encrypted email with Icedove and Enigmail.
Chapter 4g. Malware Mitigation.

Chapter 5. Supporting the Projects that Made this Tutorial Possible.

Conclusion