- 1 First time user?
- 2 Download Whonix
- 3 Verify the Whonix images
- 4 Install Whonix
- 5 Stay tuned
- 6 Known bugs
- 6.1 Normal
- 6.2 Minor
- 7 Footnotes
- 8 License
First time user?
|The default username is: user |
The default password is: changeme
Note: You need to download both Gateway and Workstation virtual machine images.
|Download Easy||Download Easy||Yes ||Very Low ||High |
|Verify the images using the Signing Key||Yes ||-||-|
|||Torrent Download||Torrent Download||No||Medium ||High |
|||Onion Download||Onion Download||Yes ||Low||High |
|Build from source code||See Build Anonymity||Very High ||Best  |
Verify the Whonix images
It is important to check the integrity of the virtual machine images you downloaded to make sure no man-in-the-middle attack or file corruption happened. (See Download Security.)
|Warning: Do not continue if verification failed! You risk using infected or erroneous files! The whole point of verification is to confirm file integrity.|
Whonix virtual machine images are cryptographically signed using OpenPGP by Whonix developer Patrick Schleizer.
Otherwise, follow the instructions:
- For Linux: Ubuntu, Debian, Whonix, etc. using kgpg
- For Linux: using the command line
- For Windows
- For Mac
Read and apply the Security Advice.
- Install VirtualBox.
- Download Whonix and import both Whonix images into VirtualBox. Do not change any settings when importing!
In case you need help
There is a tutorial with screenshots, see VirtualBox import instructions.
There are also Video Tutorials.
If you still need help, please check the Support page.
Read and apply the Post Install Advice.
Reading the latest news is important to stay on top of latest developments. Should security vulnerabilities ever be found in Whonix, any major issues (such as with the updater) happen or should an improved version be released, you should be informed.
Whonix News Blogs
For your convenience, there are multiple choices to get news. Choose at your preference.
- Whonix Important Blog - Most important stuff only. Security vulnerabilities and new stable versions only. For people with very limited time and interest in Whonix development and news.
- Whonix Feature Blog - Includes everything from Whonix Important Blog. Also testers-only and developers versions are announced. Has a relaxed posting policy. Also blog posts about updated articles, new features, future features, development, call for testing, general project thoughts and so on will be published.
- Other choices. 
It's recommended at least to read Whonix Important Blog if you are in a hurry. Have a look into Whonix Feature Blog if you are generally interested to learn about anonymity/privacy/security related things or to see what's going on with Whonix.
Operating System Updates
You should regularly check for operating system updates on your host operating system, on Whonix-Workstation and on Whonix-Gateway as highly recommended in the Security Guide.
There is no auto-update feature for Tor Browser. You will be notified about new Tor Browser versions by whonixcheck. Tor Browser's built in update check mechanism also works in Whonix. For instructions how to update the browser, see Tor Browser. Additionally it might also be wise to subscribe to https://blog.torproject.org for news.
Whonix Version Check and Whonix News
Social Media Profiles
Because some people will do so even though it is not recommended, messages from the Whonix Feature Blog will be automatically mirrored to Whonix Twitter Profile, to Whonix Facebook Profile and to Whonix Google+ Profile.
If you won't get into trouble by letting others learn about Whonix, feel free to follow or like those profiles (with your anonymous account) as a little way to Contribute. You can share this page on: Twitter | Facebook | Google+.
In case you are interested in Whonix source code updates, subscribe to code changes.
You might see this error when attempting to update existing Whonix versions (build version 9.4 and below.)
W: GPG error: http://sourceforge.net wheezy Release: The following signatures were invalid: KEYEXPIRED 1421449064 KEYEXPIRED 1421449064 KEYEXPIRED 1421449064 KEYEXPIRED 1421449659 KEYEXPIRED 1421449659 KEYEXPIRED 1421449064 KEYEXPIRED 1421449064 KEYEXPIRED 1421449064 KEYEXPIRED 1421449659 KEYEXPIRED 1421449064 KEYEXPIRED 1421449064 KEYEXPIRED 1421449064 KEYEXPIRED 1421449659
To fix this issue, open a terminal
fpr="916B8D99C38EAF5E8ADC7A2A8D66066A2EEACCDA" gpg --recv-keys "$fpr" gpg --fingerprint "$fpr" gpg --export "$fpr" | sudo apt-key add -
Then update your system as usual.
After that you will be able to update Tor Browser as well.
It will be fixed out of the box in Whonix 9.6 and above.
Forum support thread:
Tor Browser Startup Issues
This has been fixed out of the box in Whonix 9.3 and above.
After the upgrade to Tor Browser 4.x, it can be no longer started.
Connection Issues - Tor stops working after an Upgrade and needs a Workaround
This is fixed in Whonix 9.2 above.
In Whonix 9... When upgrading to Tor 0.2.5.8-rc-1~d70.wheezy+1 (using sudo apt-get dist-upgrade) in Whonix 9, your Tor connection may go down. There is a workaround.
## If you are using a graphical Whonix-Gateway, use: kdesudo kate /etc/apparmor.d/local/system_tor ## Or alternatively, if you are using a terminal-only Whonix-Gateway, use: sudo nano /etc/apparmor.d/local/system_tor
Scroll down until you see.
Comment out (by adding a # in front of it).
You should keep that in mind. When Whonix fixes that bug, you'll get an interactive dpkg conflict resolution dialog. This is explained in Security Guide#Updates. Just choose to install the new /etc/apparmor.d/local/system_tor file then.
Mounting (CD/DVD) Devices
You can use the following workaround.
sudo mkdir /mnt/cdrom
sudo mount /dev/cdrom /mnt/cdrom/
The following message.
mount: block device /dev/sr0 is write-protected, mounting read-only
Is expected. (It's normal that CD/DVD's are mounted read-only.)
Help fixing this bug is welcome! (github ticket)
VLC / Video Player Crash
You can use this workaround.
VLC -> Tools -> Preferences -> Video -> Output -> X11 -> Save
AppArmor Warning during Boot
If you wonder during boot about following warning.
Warning /etc/apparmor.d/... network rules not enforced.
This is not a security issue. Whonix installs AppArmor and the apparmor-profiles package by default, but does not enforce AppArmor by default. We are not there yet and Debian also does not enforce AppArmor by default yet either. The apparmor-profiles package gets installed by default for better usability, to make enforcing AppArmor easier. This warning only reflects, that the profile is not enforced by default.
Forum discussion dovecot:
During running apt-get dist-upgrade, you may see a warning similar to the following one.
15:36:37 libtorsocks(12225): sendmsg: Connection is a UDP or ICMP stream, may be a DNS request or other form of leak: rejecting. Cannot talk to rtnetlink: No such file or directory acpid: error talking to the kernel via netlink
Sounds scary, but is of no concern. See footnote for technical explanation. 
"apt-get source package" will show "dpkg-source: warning: failed to verify signature"
This is not a security issue. It is only a warning. More info here (and in the following mails).
If you want, you can get rid of it with the following workaround.
sudo unlink /etc/dpkg/origins/default sudo ln -s /etc/dpkg/origins/debian /etc/dpkg/origins/default
3. Undo afterwards to prevent unexpected issues.
sudo unlink /etc/dpkg/origins/default sudo ln -s /etc/dpkg/origins/whonix /etc/dpkg/origins/default
Proxychains Tor Browser Issue
Want to use proxychains for the connection scheme user -> Tor -> proxy? This currently won't work. For more information, see Tunnel_Proxy_or_SSH_or_VPN_through_Tor#Tor_Browser.
- By using the Tor Browser Bundle (TBB). For an introduction, see Tor Browser. See also Hide Tor and Whonix from your ISP.
- Unencrypted, unauthenticated http.
- Fallback mirror if the current one is unaccessible, try this one: http://whonix.thecthulhu.com
- Man-in-the-middle attacks could poison the download.
- It does not matter if you did the bulk download over an insecure channel, if you use OpenPGP verification at the end.
- Torrent clients known to work: transmission, Vuze, Deluge. Check this clients table. If nobody is seeding at the time, only clients with the "as" feature can be used, because we are providing a webseed.
- It's at least as secure as SSL and SHA-1, better than plain http. This is because you get the torrent file or magnet link over https and the torrent/magnet client checks the SHA-1 checksum at the end. Using OpenPGP verification would be safer.
- You to download over Tor to be able to download using
.onion.. For example, using either the Tor Browser Bundle, Whonix, Tails, etc. for download.
- When you build from source code, audit the source code for being non-malicious and reasonably bug free, you do not have to Trust the developers, the website or the SSL certificate authorities.
- By additional verification that you got the source code from the original authors and by ensuring you're using the same source code as others you get better security.
- OpenPGP is a standard for data encryption that provides cryptographic privacy and authentication through the use of keys owned by its users.
- You could alternatively search for Portable VirtualBox.
- You need both Whonix-Gateway.ova and Whonix-Workstation.ova images. Whonix is a two machine setup.
- Whonix Important Blog RSS
- Whonix Feature Blog RSS
- subscribe to Whonix Blog by e-mail (when you are registered at Whonix Blog, you can choose to which categories you want to subscribe)
- Whonix Blog posts are mirrored to Whonix User Forum You could subscribe by e-mail or by rss (recent posts or recent topics [more rss options]).
- Whonix Blog posts are mirrored to Whonix Development Mailing List
- Whonix Social Media Profiles
- Such as when a version becomes unsupported, if manual action is required, if major features break, or if security vulnerabilities are found. The policy is to use Whonix News as rarely as possible.
- So anon-ws-disable-stacked-tor environment variables changes take effect to fix the ControlPort quotes warning.
- This is because in order to implement Stream Isolation, Whonix's apt-get uwt wrapper forces apt-get through torsocks. Unfortunately, not only apt-get is forced through Tor, but also sysvinit and subsequently all daemons sysvinit is restarting. acpi_fakekey daemon uses local connections. Those will be rejected by torsocks. The worst that can happen is that acpi_fakekey won't operate until manually restarted. This is a bigger issue for web servers and alike, because those may not function until manually restarted. This will likely be fixed as soon Whonix will be based on Debian jessie, because that uses systemd, that is not effected by this as well as torsocks 2.0 may solve this.
Whonix Download wiki page Copyright (C) Amnesia <amnesia at boum dot org> Whonix Download wiki page Copyright (C) 2012 -2014 Patrick Schleizer <firstname.lastname@example.org> This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code. This is free software, and you are welcome to redistribute it under certain conditions; see the wiki source code for details.Some icons created by third parties, Free licenses as well, see Authorship Images created by third parties for details.
Log in | OpenID | Contact | Impressum | Datenschutz | Haftungsausschluss | Investors | Donate