Computer Security Introduction

From Whonix


Whonix ™ comes with many security features [archive]. Whonix ™ is Kicksecure ™ security hardened by default and also provides extensive Documentation including a System Hardening Checklist. The more you know, the safer you can be.

This page is an introduction to computer security.


Whonix ™ first time users warning Before reviewing chapters in the Computer Security section, be sure to also read the Warning page.

Info Wiki entries in this section purposefully focus on:

  • General computing security information.
  • Host operating system security advice.
  • Preparatory steps before installing Whonix ™ using a Type I hypervisor (Qubes-Whonix ™) or a Type II hypervisor like VirtualBox or KVM.

General Advice[edit]

With its default settings, Whonix ™ may provide better protection than Tor alone. Achieving greater security depends on how much time the user is willing to invest in Whonix ™ configuration. Security also rests upon the daily practices and procedures that have been adopted by the user, see Documentation.


Info It is important to store multiple, encrypted backups of sensitive data.

If the user does not possess at least two copies of the original data, then it should be considered lost. The reason is data on one medium might become inaccessible and beyond repair at any minute. In this case, the computer would not even detect the risk, so data recovery tools would not be of help either. [1]

Best practice recommendations:

  • Store the original, encrypted file on a medium like the internal hard drive.
  • Create a first encrypted backup: for example, on an external hard drive from manufacturer A.
  • Create a second encrypted backup: for example, on an external hard drive from manufacturer B.

For greater security and to protect from incidents like fire or theft, backups in separate physical locations are recommended. Additionally, backups can be stored on remote servers, but the user must be sure it is encrypted properly. [2]

Safer Upgrades[edit]

If Whonix ™ is already installed, before a Whonix ™ upgrade is performed on the current platform it is best to shutdown any running virtual machine (VM) instances, particularly if they are attached to the internal virtual network ("Whonix" or sys-whonix):

  • Non-Qubes-Whonix ™: If running VM instances are not shutdown, there is a cross-contamination risk for new machines being imported into the virtualizer. For example, this is possible if a powerful adversary has taken control over those VMs currently in use. This action is not required if the user intends to create a new virtual network for the machines being imported.
  • Qubes-Whonix ™: Before upgrading Whonix ™ TemplateVMs, close as many open VMs as possible. Do not run VMs from different domains at the same time as upgrading.

Tor Browser[edit]

Info Tip: Non-Qubes-Whonix ™ users are recommended to always have the latest Tor Browser Bundle (TBB) [archive] (.onion) [archive] release installed on the host operating system (OS). Qubes-Whonix ™ users may also want to have TBB installed in a non-Whonix ™ TemplateVM, like Fedora or Debian.

Refer to the Non-Whonix ™ Tor Browser chapter for TBB installation instructions on all platforms. TBB is useful to test whether or not:

  • The user lives in a censored area.
  • Tor is blocked by the Internet Service Provider (ISP).
  • (Private) (obfuscated) bridges will be needed for operation of Tor Browser in Whonix ™, see Bridges.

If TBB fails to properly connect to Tor on the host OS or from a non-Whonix ™ AppVM in Qubes, then Whonix ™ will similarly fail to work. Another benefit of installing TBB in this fashion is that if Tor Browser unexpectedly stops running in Whonix ™, then Tor Browser can still be independently used to visit the Whonix ™ website for a solution to this issue.

For better security and privacy, users should read and follow the advice in the Tor Browser chapter.

Known Bugs[edit]

To learn about known bugs affecting all platforms, see here. Refer to the issue tracker for a list of all all open issues affecting Whonix ™.

Greater Security and Next Steps[edit]

After reading and applying relevant steps outlined in this section:

In all cases, users should follow the Post-installation Security Advice.

For greater security pre- and post-Whonix ™ installation, users should read the Documentation pages widely to learn more about potential threats and mitigations. For instance, users might like to consult the Design pages, and consider the recommendations outlined in the Basic Security Guide and Advanced Security Guide sections. Users with limited time can refer to the System Hardening Checklist.


  1. In such cases the user might get lucky with professional data recovery companies, but the usual cost is a few thousand dollars.
  2. That is, with a recommended encryption method and a suitably long passphrase.

Fosshost is sponsors Kicksecure ™ stage server Whonix old logo.png
Fosshost About Advertisements

Search engines: YaCy | Qwant | ecosia | MetaGer | peekier | Whonix ™ Wiki

Follow: 1024px-Telegram 2019 Logo.svg.png Iconfinder Apple Mail 2697658.png Twitter.png Facebook.png Rss.png Reddit.jpg 200px-Mastodon Logotype (Simple).svg.png

Support: Discourse logo.png

Donate: Donate Bank Wire Paypal Bitcoin accepted here Monero accepted here Contriute

Whonix donate bitcoin.png Monero donate Whonix.png United Federation of Planets 1000px.png

Twitter-share-button.png Facebook-share-button.png Telegram-share.png link=mailto:?subject=Computer Security Introduction&body= link= Security Introduction link= Security Introduction link= Security Introduction%20 Security Introduction

We are looking for video makers to help create demonstration, promotional and conceptual videos or tutorials.

https link onion link Priority Support | Investors | Professional Support

Whonix | © ENCRYPTED SUPPORT LP | Heckert gnu.big.png Freedom Software / Osi standard logo 0.png Open Source (Why?)

The personal opinions of moderators or contributors to the Whonix ™ project do not represent the project as a whole.

By using our website, you acknowledge that you have read, understood and agreed to our Privacy Policy, Cookie Policy, Terms of Service, and E-Sign Consent.