Edward Snowden, whistleblower, privacy advocate, president of the Freedom of the Press Foundation board   
Connections are forced through Tor®. DNS leaks are impossible, and even malware with root privileges cannot discover the user's real IP address. Leak tested through corridor (Tor® traffic whitelisting gateway) and other leak tests.
Booting into VM Live Mode is as simple as choosing Live Mode in the boot menu. Alternatively Debian, Kicksecure and perhaps other Debian-based hosts can boot their existing host operating system into Host Live Mode.
Better encryption thanks to preinstalled random number generators.
Distinct applications are routed through different paths in the Tor® network.
AppArmor profiles restrict the capabilities of commonly used, high-risk applications.
Whonix uses Kernel Hardening Settings as recommended by the Kernel Self Protection Project (KSPP).
Whonix provides additional security hardening measures and user education to provide better protection from viruses.
Console Lockdown disables legacy login methods for improved security hardening.
Configured for anonymous Tor® use.
Visit any destination including modern websites such as YouTube.
Running low on RAM isn't a security problem. swap-file-creator will create an encrypted swap file.
Whonix is independently verifiable by security experts and software developers around the world; you don’t have to trust developer claims. This improves security and privacy for everyone.
Whonix respects data privacy principles. We don’t make advertising deals or collect sensitive personal data. We’re funded directly by user contributions and that’s how it should be.
A canary confirms that no warrants have ever been served on the Whonix project.
In oversimplified terms, Whonix is just a collection of configuration files and scripts. Whonix is not a stripped down version of Debian; anything possible in "vanilla" Debian GNU/Linux can be replicated in Whonix. About Whonix