Actions

Qubes-Whonix ™ Overview

From Whonix

(Redirected from Qubes OS)



Qubes Logo
Whonix Logo


Overview[edit]

Qubes-logo-blue.pngWhonix old logo.pngQubes-Whonix ™ is the seamless combination of Qubes-logo-blue.png Qubes OS [archive] and Whonix old logo.png Whonix ™ [archive] for advanced security and anonymity.

In this configuration Whonix ™ runs on top of Qubes inside virtual machines (VMs), just like any other OS on the same platform (Fedora, Debian, Arch Linux and so on).

The Qubes bare-metal hypervisor is based on Xen [archive] and Fedora [archive]. Via hardware support like VT-x [archive], VT-d [archive] and TXT [archive], [1] Qubes has implemented a strict security-by-isolation architecture. Hardware controllers and multiple user domains (qubes) are isolated using separate VMs that are explicitly assigned different levels of trust, yet the desktop experience is user-friendly and well-integrated.

Whonix ™ is based on Debian [archive] and Tor [archive]. The design provides a two-VM, split security architecture: an isolated Whonix-Gateway ™ (ProxyVM; sys-whonix) for complete routing of traffic over Tor; and Whonix-Workstation ™ (App Qube; anon-whonix) for all desktop applications, which serves as a tailored OS environment for Tor-based privacy/anonymity.

To use Qubes-Whonix ™, Qubes must first be installed as a hypervisor on the physical host computer, followed by installation of the two separate Whonix ™ TemplateVMs -- whonix-gw-16 and whonix-ws-16 -- on top of Qubes. From this point, the Whonix ™ TemplateVMs can be used for customization and creation of multiple Whonix-Gateway ™ ProxyVMs and Whonix-Workstation ™ AppVMs, enabling enhanced compartmentalization of user activities for better privacy. [2]

For a more in-depth consideration of Qubes-Whonix ™ advantages, see: Why use Qubes over other Virtualizers?

Qubes-Whonix Security Disadvantages - Help Wanted! [archive]

Figure: Qubes OS Design [3]

Qubesosoverviewv2.png

Guides[edit]

For major TemplateVM and AppVM operations, refer to the following guides:

For improved security and anonymity after installing Qubes-Whonix ™, refer to the following guides:

Advanced:

Support[edit]

Before seeking personal support, please first search for the issue and a possible, documented solution. In many cases the issue can be solved by inspecting the phabricator issues tracker, reading Whonix ™ guides/documentation, conducting web searches, and examining past support requests.

If a search yields no results, support requests should be directed to the most appropriate forum:

Footnotes[edit]



Fosshost is sponsors Kicksecure ™ stage server Whonix old logo.png
Fosshost About Advertisements

Search engines: YaCy | Qwant | ecosia | MetaGer | peekier | Whonix ™ Wiki


Follow: 1024px-Telegram 2019 Logo.svg.png Iconfinder Apple Mail 2697658.png Twitter.png Facebook.png Rss.png Reddit.jpg 200px-Mastodon Logotype (Simple).svg.png

Support: 1024px-Telegram 2019 Logo.svg.png Discourse logo.png Matrix logo.svg.png

Donate: Donate Bank Wire Paypal Bitcoin accepted here Monero accepted here Contriute

Whonix donate bitcoin.png Monero donate Whonix.png United Federation of Planets 1000px.png

Twitter-share-button.png Facebook-share-button.png Telegram-share.png Iconfinder Apple Mail 2697658.png Reddit.jpg Hacker.news.jpg 200px-Mastodon Logotype (Simple).svg.png

There are five different options for subscribing to Whonix ™ source code changes.

https link onion link Priority Support | Investors | Professional Support

Whonix | © ENCRYPTED SUPPORT LP | Heckert gnu.big.png Freedom Software / Osi standard logo 0.png Open Source (Why?)

The personal opinions of moderators or contributors to the Whonix ™ project do not represent the project as a whole.

By using our website, you acknowledge that you have read, understood and agreed to our Privacy Policy, Cookie Policy, Terms of Service, and E-Sign Consent.