Anonymize Everything You Do Online

Generic laptop computer Whonix Desktop

Download, Install, Run

Whonix isn't a program like most of your applications. It's a full operating system that runs inside your current one. Select which operating system your computer is running.

Download for Windows 10

Windows

Download for Linux

Linux

Run it with VirtualBox

Download for Mac

macOS

Run it with VirtualBox

Download for Qubes

Qubes

Download for KVM

KVM

For those who prefer KVM over VirtualBox

Freedom of the Press Foundation SecureDrop Journalist Workstation environment for submission handling is based on Qubes-Whonix.”
Wired ”For the even more paranoid, there is a lesser-known Tor-enabled OS called Whonix”
The Guardian ”Whonix is about as anonymous as an OS can get before it all becomes too inconvenient for normal use.”
The Intercept ”Whonix, an operating system you can run in a virtual machine to maximize your online anonymity; it’s ideal for maintaining a secret identity.”
The Intercept ”Whonix adds a layer of anonymity to your business tasks.”
The Tor Project ”Whonix is a privacy ecosystem that utilizes compartmentalization to provide a private, leak-resistant environment for many desktop computing activities. Whonix helps users use their favorite desktop applications anonymously.”

The Tor ® Project

Edward Snowden ”I use Qubes and a Whonix gateway literally everyday”

Edward Snowden, whistleblower, privacy advocate, president of the Freedom of the Press Foundation board [1] [2] [3]

Micah Lee “Whonix is great because you can be confident that everything you do in the workstation VM is anonymously going through the Tor network.”

Micah Lee, journalist and security engineer

All activity in a virtual machine, all internet traffic through Tor® network

Whonix is the best way to use Tor® and is strongest protection of your IP address.

Tor Browser with duckduckgo

Applications are reviewed and pre-configured.

Fully Featured and Advanced Security Features

Leak IP Address

Impossible to leak IP address

Connections are forced through Tor®. DNS leaks are impossible, and even malware with root privileges cannot discover the user's real IP address. Leak tested through corridor (Tor® traffic whitelisting gateway) and other leak tests.

Live Mode

Live Mode

Booting into Live Mode is a simple as choosing Live Mode in the boot menu.

Kicksecure

Based on Kicksecure ™

Whonix is based on Kicksecure ™ which is a a security-hardened Linux distribution.

Tor

Based on Tor®

Whonix utilizes Tor®, which provides an open and distributed relay network to defend against network surveillance.

kloak

Keystroke Anonymization

Keystrokes can be used to track users. To prevent this, Whonix comes with kloak installed by default.

time

Time Attack Defenses

Time attacks are defeated by Boot Clock Randomization and secure network time synchronization through sdwdate (Secure Distributed Web Date).

entropy

Entropy Enhancements

Better encryption thanks to preinstalled random number generators.

Stream Isolation

Stream Isolation

Different applications are routed through different paths through the Tor® network.

AppArmor

AppArmor

AppArmor profiles to restrict the capabilities of commonly used, high-risk applications.

AppArmor

Kernel Self Protection Settings

Whonix uses Kernel Hardening Settings as recommended by the Kernel Self Protection Project (KSPP).

AppArmor

Protect Linux user accounts against brute force attacks

By using pam tally2.

AppArmor

Strong Linux User Account Separation

security-misc

AppArmor

anonymity, privacy and security settings pre-configuration

anon-apps-config

anbox

Android Support

Run Android Application using anbox.

Virus Protection

Virus Protection

Additional Security Hardening measures and user education through Whonix provide better protection from viruses.

Advanced Firewall

Advanced Firewall

Configured for anonymous Tor® use.

YouTube

Tor® Browser

Visit any website including modern websites such as YouTube.

YouTube

swap-file-creator

Running low on RAM isn't a security problem. swap-file-creator will create an encrypted swap file.

server

Hosting Location Hidden Servers

Whonix is the safest way to Onion Services .

History

History

An eight year history of protecting our users against Real World Attacks.

Fully Auditable

Fully auditable

You don’t have to trust our word that it respects and protects you. It is independently verifiable by security experts and software developers around the world. This improves security and privacy for everyone.

privacy

Complete respect for privacy

Your data always belongs to you, and only you. We don’t make advertising deals or collect sensitive personal data. We’re funded directly by our users paying what they want. And that’s how it should be.

Canary

Warrant Canary

A canary confirms that no warrants have been served on the Whonix project.

Debian

Based on Debian

In oversimplified terms, Whonix is just a collection of configuration files and scripts. Whonix is not a stripped down version of Debian; anything possible in "vanilla" Debian GNU/Linux can be replicated in Whonix. About Whonix

Freedom

Complete user freedom

There are no artificial restrictions on how users can reconfigure the system.

signed

Digitally signed releases

Downloads are signed so you can verify they are genuine Whonix releases.

GNU

Freedom Software

Whonix is Freedom Software and contains software developed by the Free Software Foundation and the GNU Project .

OpenSource

Open Source

All of Whonix source code is licensed under OSI Approved Licenses. We respect the rights of our users. All of Whonix is available for review, scrutiny, modification, and redistribution by anyone. Which improves security and privacy for everyone.

research

Research and Implementation Project

Be wary of those confidently calling themselves all-knowing, all-perfect. Whonix is an actively maintained research project making constant improvements -- no shortcomings are ever hidden from users.

Stream Isolation

Compatibility