(Redirected from Installer)

The Whonix-Installer is the easiest way to install Whonix on a Windows system. It requires little to no input on the user's behalf and even comes with a simple interface to start and stop the Whonix-Gateway and Whonix-Workstation. Alternatively, the VirtualBox images can be downloaded here. [1]

Download the Installer[edit]

Whonix-Installer for Windows

Verify the Installer[edit]

It is important to check the integrity of the downloaded installer file to ensure no man-in-the-middle attack or file corruption took place (see Download Security).

The Whonix-Installer has been cryptographically signed using OpenPGP [2] by the creator of the Whonix-Installer, Ego.

If the user is familiar with OpenPGP keys, download the signing key and signature straight away. Otherwise, carefully follow these instructions: Verify the Installer.

Install Whonix[edit]

Launch the verified Install Whonix.exe file and follow the instructions. Carefully read the instructions in their entirety and make sure everything is understood.

Start using Whonix[edit]

The user may now enjoy Whonix and all its features, either via Whonix.exe or Whonix for Windows, which is found on the desktop or in VirtualBox. Please note that .net Framework is required to use Whonix.exe.

Random News:

Please help in testing new features and bug fixes in Whonix.

https | (forcing) onion

Share: Twitter | Facebook

This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! See Conditions for Contributions to Whonix, then Edit! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix is a licensee of the Open Invention Network. Unless otherwise noted, the content of this page is copyrighted and licensed under the same Libre Software license as Whonix itself. (Why?)

  1. Some users report errors when using the Whonix-Installer for Windows.
  2. OpenPGP is a standard for data encryption that provides cryptographic privacy and authentication through the use of keys owned by its users.