Jump to: navigation, search


The Whonix-Installer is the easiest way to install Whonix on a Windows system. It requires little to no input on the user's behalf and even comes with a simple interface to start and stop the Whonix-Gateway and Whonix-Workstation. Alternatively, the VirtualBox images can be downloaded here. [1]

Download the Installer[edit]

Whonix-Installer for Windows

Verify the Installer[edit]

It is important to check the integrity of the downloaded installer file to ensure no man-in-the-middle attack or file corruption took place (see Download Security).

The Whonix-Installer has been cryptographically signed using OpenPGP [2] by the creator of the Whonix-Installer, Ego.

If the user is familiar with OpenPGP keys, download the signing key and signature straight away. Otherwise, carefully follow these instructions: Verify the Installer

Install Whonix[edit]

Launch the verified Whonix-Installer.exe file and follow the instructions. Carefully read the instructions in their entirety and make sure everything is understood.

Start using Whonix[edit]

The user may now enjoy Whonix and all its features, either via Whonix.exe or Whonix for Windows, which is found on the desktop or in VirtualBox. Please note that .net Framework is required to use Whonix.exe.

Random News:

Did you know that anyone can edit the Whonix wiki to improve it?

Impressum | Datenschutz | Haftungsausschluss

https | (forcing) onion
Share: Twitter | Facebook | Google+

This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! See Conditions for Contributions to Whonix, then Edit! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix (g+) is a licensee of the Open Invention Network. Unless otherwise noted, the content of this page is copyrighted and licensed under the same Libre Software license as Whonix itself. (Why?)
  1. Some users report errors when using the Whonix-Installer for Windows.
  2. OpenPGP is a standard for data encryption that provides cryptographic privacy and authentication through the use of keys owned by its users.