Whonix runs on top of Qubes as a VM (virtual machine), just like any other typical OS does in Qubes.
Qubes is based on Xen and Fedora, and through hardware support (VT-x, VT-d, TXT) Qubes provides a security-by-isolation architecture, while also offering a single integrated user-friendly desktop experience across VMs.
Whonix is based on Debian and Tor, and provides a TwoVM split security architecture with isolated Whonix-Gateway (ProxyVM) for total Tor traffic routing and Whonix-Workstation (AppVM) for user desktop applications, which serves as a tailored OS environment for Tor-based privacy/anonymity.
With Qubes-Whonix, you install Qubes as a hypervisor onto your physical host computer, and then install Whonix as two separate TemplateVMs on top of Qubes.
From here, you are able to use the Whonix TemplateVMs to customize and create as many Whonix-Gateway ProxyVMs and Whonix-Workstation AppVMs as you'd like, for optimal privacy-enhanced compartmentalization of your digital life.
- Security Advice to follow after installing Qubes-Whonix
- How to set up Tor Bridges in Qubes-Whonix
- Using Multiple Whonix-Workstations with Qubes-Whonix
For general Qubes related issues, use Qubes Support.
For general Whonix, Debian, Tor, etc related issues, use Whonix Support.
For Qubes-Whonix specific issues, use the Whonix Qubes Forum.
Please try looking through the the known issues, guides, documentation, issue tracker, web searches, and past support requests before seeking personal support. Your support needs may already be handled by these.
https | (forcing) onion
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! See Conditions for Contributions to Whonix, then Edit! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.