Jump to: navigation, search



Note: You need to download both Gateway and Workstation virtual machine images.

(1.2 GiB)
(1.3 GiB)
Anonymous Download
possible [1]
Download Security
without Verification
Download Security
with Verification
HTTP.png <html><a href="http://mirror.whonix.org.nyud.net/</html><html>/Whonix-Gateway-</html><html>.ova" target="_blank">Download</a></html> <html><a href="http://mirror.whonix.org.nyud.net/</html><html>/Whonix-Workstation-</html><html>.ova" target="_blank">Download</a></html> Yes [1] Very Low [2] High [3]
HTTP.png <html><a href="http://sourceforge.net/projects/whonix/files/current/</html><html>/Whonix-Gateway-</html><html>.ova/download" target="_blank">Download</a></html> <html><a href="http://sourceforge.net/projects/whonix/files/current/</html><html>/Whonix-Workstation-</html><html>.ova/download" target="_blank">Download</a></html> Yes [1] Very Low [4] High [3]
SSL Symbol.png <html><a href="https://jhcloos.com/whonix/Whonix-</html><html>/Whonix-Gateway-</html><html>.ova" target="_blank">Download</a></html> <html><a href="https://jhcloos.com/whonix/Whonix-</html><html>/Whonix-Workstation-</html><html>.ova" target="_blank">Download</a></html> Yes [1] Low [5] High [3]
Button sig.png <html><a href="/download/</html><html>-sig/Whonix-Gateway-</html><html>.ova.asc">OpenPGP Signature</a></html> <html><a href="/download/</html><html>-sig/Whonix-Workstation-</html><html>.ova.asc">OpenPGP Signature</a></html> Yes [1] - -
Crypto key.png Verify the images using the Signing Key Yes [1] - -
Btorrent-icon.png[6] <html><a href="/download/</html><html>-torrent/Whonix-Gateway-</html><html>.ova.torrent">Torrent Download</a></html> <html><a href="/download/</html><html>-torrent/Whonix-Workstation-</html><html>.ova.torrent">Torrent Download</a></html> No Medium [7] High [3]
Magnet icon.svg.png [8] <html><a href="magnet:?xt=urn:btih:b8969f87015c994f2c4dd93b3ed7c62861c27477&dn=Whonix-Gateway-8.ova&tr=http%3A%2F%2Fannounce.torrentsmd.com%3A6969%2Fannounce&as=http%3A%2F%2Fwebseed.whonix.org%3A8008%2FWhonix-Gateway-8.ova">Magnet Link</a></html> <html><a href="magnet:?xt=urn:btih:7a6a5294ebebef5e5edcb05aa2caf66ebaeaf300&dn=Whonix-Workstation-8.ova&tr=http%3A%2F%2Fannounce.torrentsmd.com%3A6969%2Fannounce&as=http%3A%2F%2Fwebseed.whonix.org%3A8008%2FWhonix-Workstation-8.ova">Magnet Link</a></html> No Medium [7] High [3]
Template source.png Build from source code See Build Anonymity Very High [9] Best [9] [10]
  1. 1.0 1.1 1.2 1.3 1.4 1.5 By using the Tor Browser Bundle (TBB). For an introduction, see Tor Browser. See also Hide Tor and Whonix from your ISP.
  2. Man-in-the-middle attacks could poison the download.
  3. 3.0 3.1 3.2 3.3 3.4 It does not matter if you did the bulk download over an insecure channel, if you use OpenPGP verification at the end.
  4. Man-in-the-middle attacks could poison the download.
  5. Man-in-the-middle attacks could poison the download.
  6. Torrent clients known to work: transmission, Vuze, Deluge. Check this clients table. If nobody is seeding at the time, only clients with the "as" feature can be used, because we are providing a webseed.
  7. 7.0 7.1 It is at least as secure as SSL and SHA-1, and better than plain http. This is because you get the torrent file or magnet link over https and the torrent/magnet client checks the SHA-1 checksum at the end. Using OpenPGP verification would be safer.
  8. Magnet link clients known to work: gtk-gnutella. Check this clients table. If nobody is seeding at the time, only clients with the "as" feature can be used, because we are providing a webseed.
  9. 9.0 9.1 When you build from source code, audit the source code as being non-malicious and reasonably bug free. You do not have to Trust the developers, the website or the SSL certificate authorities.
  10. You get better security from additional verification that you got the source code from the original authors and by ensuring you're using the same source code as others.