Whonix ™ is an anonymous operating system that runs like an app and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
Whonix ™ Architecture
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The Whonix ™ architecture affords several benefits:
- Only connections through Tor are permitted.
- Servers can be run, and applications used, anonymously over the Internet.
- DNS leaks are impossible.
- Malware with root privileges cannot discover the user's real IP address.
- Threats posed by misbehaving applications and user error are minimized.
- The platform has extensive security hardening.
Full Spectrum Anti-Tracking Protection
Hiding your identity is harder than just hiding your IP. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.
Table: Surveillance Technology, Impact and Whonix ™ Defenses
|Surveillance Technology||Impact on your Privacy||Whonix ™ Tracking Protection Technology|
|IP address tracking||IP is tied to user identity and physical location.||IP cloaking using Tor|
|Browser fingerprinting||Tracking, creating a profile of the user even if the user is already cloaking its IP.||Tor Browser|
|Website Traffic Fingerprinting||Your internet service provider (ISP) knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. 
For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
|IP cloaking using Tor|
|Personal keyboard typing fingerprinting||Re-identification once you are typing on a website because of your personal typing style.||kloak (keystroke anonymizer)|
|Time attacks||Individual computer time can give away your identity.||Boot Clock Randomization and secure network time synchronization through sdwdate (Secure Distributed Web Date)|
Whonix ™ User Groups
- Investigators and whistleblowers whose work threatens the powerful.
- Within an isolated environment, research and evidence can be gathered without accidental exposure.
- Researchers, government officials or business-people who may be targets of espionage.
- Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
- Journalists who endanger themselves and their families by reporting on organized crime.
- Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
- Political activists under targeted surveillance and attack.
- The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a Whonix ™ user is greatly increased.
- Average computer users in a repressive or censored environment.
- Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
- Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed.
- Whonix ™ does not silently upload identifying information in the background.
- Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). If you can see both flows, simple statistics based on data volume and timing can determine whether they match up.
In Qubes-Whonix ™, these VMs are named
- VPNs do not even hide visited websites from your Internet Service Provider