Whonix ™ - Software That Can Anonymize Everything You Do Online
Applications are reviewed and pre-configured










Fully Featured with Advanced Security Components
Impossible to leak IP address
Connections are forced through Tor. DNS leaks are impossible, and even malware with root privileges cannot discover the user's real IP address. Leak tested through corridor (Tor ® traffic whitelisting gateway) and other leak tests.
Live Mode
Booting into VM Live Mode is as simple as choosing Live Mode in the boot menu. Alternatively Debian, Kicksecure and perhaps other Debian-based hosts can boot their existing host operating system into Host Live Mode.
Based on Tor ®
Whonix utilizes Tor ®, which provides an open and distributed relay network to defend against network surveillance. Unlike Virtual Private Networks (VPN), Tor provides anonymity by design and removes trust from the equation.
Based on Kicksecure ™
Whonix ™ is based on Kicksecure ™ which is a security-hardened Linux distribution.
Kernel Self Protection Settings
Whonix uses Kernel Hardening Settings as recommended by the Kernel Self Protection Project (KSPP).
21 more amazing features →
Keystrokes Kloak
Keystrokes can be used to track users. To prevent this, Whonix comes with kloak installed by default.
Android Support
Run Android applications using Anbox (outdated) or Whonix-Custom-Workstation using Android x86.
Virus Protection
Whonix provides additional security hardening measures and user education to provide better protection from viruses.
Brute force attack protection
Protect Linux user accounts against brute force attacks By using pam tally2 .
Time Attack Defenses
Time attacks are defeated by Boot Clock Randomization and secure network time synchronization through sdwdate (Secure Distributed Web Date).
Discovery and traffic analysis attacks
Protect against guard discovery and related traffic analysis attacks vanguards .
Strong Linux User Account Separation
Learn more about our Linux User Account Separation security-misc .
Strong Anonymity, privacy and security settings
Learn more about our anonymity, privacy and security settings pre-configuration anon-apps-config .
Tor ® Browser
Tor ® Browser is optimized for anonymity and millions of daily users help you blend in with the crowd. Visit any destination including modern websites such as YouTube.
swap-file-creator
Running low on RAM isn't a security problem. swap-file-creator will create an encrypted swap file.
TCP ISN CPU Information Leak Protection
Prevent de-anonymization of Tor onion services via utilization of the Tirdad kernel module for random ISN generation.
Hosting Location Hidden Servers
Whonix is the safest way to Host Location Hidden Services / Onion Services.
Based on Debian
In oversimplified terms, Whonix is just a collection of configuration files and scripts. Whonix is not a stripped down version of Debian; anything possible in "vanilla" Debian GNU/Linux can be replicated in Whonix. About Whonix
Freedom Values
10 Years of Success
We have protected our users against Real World Attacks with a long 10 years history of success. We're always working to improve Whonix for the next 10 years of privacy and security with Whonix.
Open Source
All the Whonix source code is licensed under OSI Approved Licenses. We respect user rights to review, scrutinize, modify, and redistribute Whonix. This improves security and privacy for everyone.
Freedom Software
Whonix is Freedom Software and contains software developed by the Free Software Foundation and the GNU Project.
Research and Implementation Project
Whonix makes modest claims and is wary of overconfidence. Whonix is an actively maintained research project making constant improvements; no shortcomings are ever hidden from users.
Fully auditable
Whonix is independently verifiable by security experts and software developers around the world; you don’t have to trust developer claims. This improves security and privacy for everyone.
Complete respect for privacy and user freedom
Whonix respects data privacy principles. We don’t make advertising deals or collect sensitive personal data. There are no artificial restrictions imposed on possible system configurations.