From Whonix


Why is the Default Username "user" and Password "changeme"?[edit]

Because 'technically' there is "no installation". Whonix ™ images are pre-installed operating system images. The history of Whonix ™ is that we started to ship downloadable VM images. What you might perceive as installation process, for example VirtualBox import is "not an installation". It is the same for any VM image that would be imported. There is no feature in virtualizers that would allow to inject code to do things at this stage. The code running for importing the images is solely by the virtualizer and modifying that would be non-trivial and require to maintain a fork of the virtualizer. To add such code on the operating system that hosts Whonix ™ would be non-trivial and operating system specific. It would require to mount and modify the images. Too unimportant to put any effort into it. Would probably result in more bugs, and confusion, than what we have now. I see Qubes(-Whonix ™) as the evolution of this, since there are no passwords there.

For further information, refer to this forum discussion: Whonix ™ Installation from default password to user password [archive].

Where are the 32-bit Whonix ™ Builds?[edit]

Only 64-bit Whonix ™ builds are available for download. [1] This decision is based on the small number of affected users and the associated maintenance burden. To learn more, see: 32-bit or 64-bit?

Forum discussion: virtualbox has no installation candidate [archive].

Why is KVM Recommended over VirtualBox?[edit]

In summary:

  • VirtualBox does not meet the definition of Free Software;
  • the parent company Oracle has poor security practices -- serious bugs have remained unpatched for an extended period; and
  • significant VirtualBox functionality is only available as a proprietary extension.

To learn more, see: Why Use KVM Over VirtualBox?

Why is Qubes Recommended over other Virtualizers?[edit]

In summary, Qubes:

  • runs a bare-metal virtualizer (Xen) and isolates hardware controllers and multiple user domains (qubes) in separate VMs that are explicitly assigned different levels of trust;
  • has an advanced separation / least privilege design;
  • provides better hardware and protocol protection than software compartmentalization;
  • provides significant networking protection;
  • allows advanced security features like Disposable VMs, secure copy / paste operations between VMs, secure copying and transfer of files between VMs, and sanitization of PDFs and images;
  • can tunnel the whole system more easily through Tor;
  • enables multiple Whonix-Workstation ™ AppVMs to easily use the same Whonix-Gateway ™ ProxyVM without being able to make contact with one another; and
  • is easier to install and has better performance.

To learn more, see:


  1. From Whonix ™ 14 onward.

Fosshost is sponsors Kicksecure ™ stage server Whonix old logo.png
Fosshost About Advertisements

Search engines: YaCy | Qwant | ecosia | MetaGer | peekier | Whonix ™ Wiki

Follow: 1024px-Telegram 2019 Logo.svg.png Iconfinder Apple Mail 2697658.png Twitter.png Facebook.png Rss.png Reddit.jpg 200px-Mastodon Logotype (Simple).svg.png

Support: Discourse logo.png

Donate: Donate Bank Wire Paypal Bitcoin accepted here Monero accepted here Contriute

Whonix donate bitcoin.png Monero donate Whonix.png United Federation of Planets 1000px.png

Twitter-share-button.png Facebook-share-button.png Telegram-share.png Iconfinder Apple Mail 2697658.png Reddit.jpg 200px-Mastodon Logotype (Simple).svg.png

There are five different options for subscribing to Whonix ™ source code changes.

https link onion link Priority Support | Investors | Professional Support

Whonix | © ENCRYPTED SUPPORT LP | Heckert gnu.big.png Freedom Software / Osi standard logo 0.png Open Source (Why?)

The personal opinions of moderators or contributors to the Whonix ™ project do not represent the project as a whole.

By using our website, you acknowledge that you have read, understood and agreed to our Privacy Policy, Cookie Policy, Terms of Service, and E-Sign Consent.