When using a clearnet browser out of necessity

I think QubesOS is designed to protect privacy when used in conjunction with Whonix. However, when using Whonix, the connection is often refused. So I often have no choice but to connect with firefox using disposable fedora.
So I wanted to at least reduce the fingerprint as much as possible, so I heard that Mullvad browser is good, so I tried to install it in the fedora template, but I couldn’t install it because it wasn’t in the repository.
Is there any better way? What do you do in this case?

There are a lot of threads and Howtos on how to install a sys-vpn qube. Then you can connect to your favorite VPN (e.g., mullvad) and avoid connecting directly through your disposable Fedora.

This shouldn’t be happening. Are you saying the connection to Tor is not going through? What is the networking VM for your whonix gateway netvm (sys-whonix)? Are you launching Firefox in a disp and then setting that disposable’s networking to the whonix gateway qube?

It’s not uncommon for software, including specific (often the newest) releases to not be in distro repos. Mullvad browser seems to be available on Linux through a self-packaged binary.

I think (s)he means that a lot of sites block access from all TOR exit points.

2 Likes

When so, I’m not using those sites, but alternatives. When no alternative is available, I’m suppressing the urge. Curiosity killed the cat, otherwise.
I mean - I want to access the site via tor. The site doesn’t allow it. But, it’s a matter of life and death to me. So I choose “to reduce my fingerprint” trying to access it via clearnet either way? Really?

This anyway isn’t Qubes OS specific question.

I maintain two seperate identities split across different devices and web browsers: public and private. My public identity is currently split across two devices: my Librem 5 USA (PureOS) and Librem 14 (DebianVM) using Firefox ESR; while my private identity is only on the Librem 14 (WhonixVM) using Tor Browser - eventually I plan to acquire a lapdock for the Librem 5 USA to truly seperate the two devices and their purposes.

My public identity has a unique browser fingerprint using Firefox ESR: it is designed for compatibility and credibility with the public. I use many web extensions for various purposes and make no attempt to fool naive scripts.

My private identity has the same browser fingerprint using Tor Browser: it is strictly for anonymity purposes. The Security Level is always set to Safest.

May I congratulate you on having a Librem 5 USA that actually works.

Mine has never been able to make a phone call or otherwise connect to a network and tech support stopped responding to me.

1 Like

Well my Librem 5 USA does not fully work for phone calls either: I can establish a voice session and hear the other party, but they cannot hear me. That being said, I keep the microphone/camera hardware killswitch enabled almost all of the time, and I am aware that the microphone does not initialize immediately after disabling the killswitch whenever another entity solicits my immediate attention. I have very little interest in solving this issue because I do not want my focus to be disturbed by any urgent calls to action.

1 Like

You can place a call, at least. Mine cannot even find the network. The worst $2K I ever spent in my life.