VFAQ

From Whonix
Jump to navigation Jump to search

Why is the Default Username "user" and Password "changeme"?[edit]

Because 'technically' there is "no installation". Whonix images are pre-installed operating system images. The history of Whonix is that we started to ship downloadable VM images. What you might perceive as installation process, for example VirtualBox import is "not an installation". It is the same for any VM image that would be imported. There is no feature in virtualizers that would allow to inject code to do things at this stage. The code running for importing the images is solely by the virtualizer and modifying that would be non-trivial and require to maintain a fork of the virtualizer. To add such code on the operating system that hosts Whonix would be non-trivial and operating system specific. It would require to mount and modify the images. Too unimportant to put any effort into it. Would probably result in more bugs, and confusion, than what we have now. I see Qubes(-Whonix) as the evolution of this, since there are no passwords there.

For further information, refer to this forum discussion: Whonix Installation from default password to user passwordarchive.org.

Where are the 32-bit Whonix Builds?[edit]

Only 64-bit Whonix builds are available for download. This decision is based on the small number of affected users and the associated maintenance burden. To learn more, see: 32-bit or 64-bit?

Forum discussion: virtualbox has no installation candidatearchive.org.

Why is KVM Recommended over VirtualBox?[edit]

In summary:

  • VirtualBox does not meet the definition of Free Software;
  • the parent company Oracle has poor security practices -- serious bugs have remained unpatched for an extended period; and
  • significant VirtualBox functionality is only available as a proprietary extension.

To learn more, see: Why Use KVM Over VirtualBox?

Why is Qubes Recommended over other Virtualizers?[edit]

In summary, Qubes:

  • runs a bare-metal virtualizer (Xen) and isolates hardware controllers and multiple user domains (qubes) in separate VMs that are explicitly assigned different levels of trust;
  • has an advanced separation / least privilege design;
  • provides better hardware and protocol protection than software compartmentalization;
  • provides significant networking protection;
  • allows advanced security features like Disposable VMs, secure copy / paste operations between VMs, secure copying and transfer of files between VMs, and sanitization of PDFs and images;
  • can tunnel the whole system more easily through Tor;
  • enables multiple Whonix-Workstation AppVMs to easily use the same Whonix-Gateway ProxyVM without being able to make contact with one another; and
  • is easier to install and has better performance.

To learn more, see:

How can I be sure I'll like Whonix?[edit]

You cannot. There's a downside and an upside:

We believe security software like Whonix needs to remain open source and independent. Would you help sustain and grow the project? Learn more about our 12 year success story and maybe DONATE!