The Tor ® Project
Edward Snowden, whistleblower, privacy advocate, president of the Freedom of the Press Foundation board   
Connections are forced through Tor®. DNS leaks are impossible, and even malware with root privileges cannot discover the user's real IP address. Leak tested through corridor (Tor® traffic whitelisting gateway) and other leak tests.
Booting into Live Mode is a simple as choosing Live Mode in the boot menu.
Better encryption thanks to preinstalled random number generators.
Distinct applications are routed through different paths in the Tor® network.
AppArmor profiles restrict the capabilities of commonly used, high-risk applications.
Whonix uses Kernel Hardening Settings as recommended by the Kernel Self Protection Project (KSPP).
Additional security hardening measures and user education through Whonix provide better protection from viruses.
Console Lockdown disables legacy login methods for improved security hardening.
Configured for anonymous Tor® use.
Visit any destination including modern websites such as YouTube.
Running low on RAM isn't a security problem. swap-file-creator will create an encrypted swap file.
Whonix is the safest way to host Onion Services.
You don’t have to trust our word that it respects and protects you. It is independently verifiable by security experts and software developers around the world. This improves security and privacy for everyone.
Your data always belongs to you, and only you. We don’t make advertising deals or collect sensitive personal data. We’re funded directly by our users paying what they want. And that’s how it should be.
A canary confirms that no warrants have been served on the Whonix project.
In oversimplified terms, Whonix is just a collection of configuration files and scripts. Whonix is not a stripped down version of Debian; anything possible in "vanilla" Debian GNU/Linux can be replicated in Whonix. About Whonix
All of Whonix source code is licensed under OSI Approved Licenses. We respect the rights of our users. All of Whonix is available for review, scrutiny, modification, and redistribution by anyone. This improves security and privacy for everyone.