This is a cached version of https://whonix.org/wiki/Homepage from 2/28/2026, 3:27:31 PM.
Whonix - Superior Internet Privacy
Whonix can anonymize everything you do online! It runs like an App, is a Free, Open Source and Kicksecure™ hardened Linux distribution.
Want to help us grow? Whonix - Superior Internet Privacy From Whonix Jump to navigation Jump to search Whonix ® Download About Docs Community Support Tools Upload file Special pages Recent changes Print Version Page meta What links here Related changes Page information Page Read Edit History Move Protection Unwatch Watch Delete Purge User Preferences Watchlist Contributions Logout Create account Login Donate Superior Internet Privacy with Whonix As handy as an app - delivering maximum anonymity and security. Download Now Your browser does not support the video tag. Learn What Is Whonix? Whonix gives your desktop Maximum privacy and anonymity on the Internet Greater reliability and security than any other tool on the market! Download, Install, Run - 100% FREE Whonix runs like an app inside your operating system, keeping you safe and anonymous. Whonix is available for: Windows Linux macOS Qubes KVM On USB ISO Is Whonix safer than VPNs? Whonix VPNs Hidden IP address (basic) Your IP address acts as a global unique identifier which is linked to your real identity. Any website or server you are connecting to knows your IP address. Most Internet Service Providers (ISPs) keep a log of IP addresses assigned to you and when you used them. The IP address reveals your approximate physical location to any destination you connect to. Hidden Identity Even if your IP is hidden, trackers can use "Fingerprinting" techniques to identify you. Hiding your identity is harder than just hiding your IP! Whonix protects from browser fingerprinting, and website traffic fingerprinting. No Logging Whonix cannot log user IP addresses or activity. This is due to a fundamental architecture design decision to keep maximum user privacy. Most VPNs have a policy of not storing any user data. But if they were forced to do so, they could start storing user data easily. Leak Shield Even if a connection is tunneled, it can be hijacked inside the browser. One leaky connection already compromises the user's anonymity. Whonix has a watertight leak shield. Some VPN providers also have a fail-closed mechanism, however the quality varies very much and fails against malware. Server Relays avg. The servers used for tunneling MUST NOT know the user. This is only possible if there are multiple and independent servers as relays on a strict need-to-know basis and onion-layered encryption. Some VPN providers provide double VPN but it’s still the same provider and lacks distributed trust by design. 3 1 Virus / Malware Protection A malware (virus) free system is crucial because a lot of malware steals the user's data and identity. Whonix is based on Kicksecure, a hardened, well documented Linux so the user is already safer. Some VPN subscriptions contain anti-malware scanners but their capability is limited. A better approach is to prevent any malware from entering the system through security hardening and knowledge. Compare more features ▼ ... ... Keyboard Typing Cloak Trackers can identify their targets by their keyboard typing style. Whonix prevents this kind of attack. Timestamp Attack Protection Trackers can identify their targets by minimal divergence from the standard time in the network requests called time attacks. Whonix prevents this kind of attack. App Stream Isolation In Whonix distinct pre-installed applications are routed through different network paths for maximum security. Open Source / Freedom Whonix has a full dedication to Open Source and Freedom Software. Only some VPNs have open source elements and even less are fully Open Source. Pricing FREE or Donation $5 - $20 per month Download Whonix now! Learn More: Whonix versus VPNs Trusted by Security Experts For the even more paranoid, there is a lesser-known Tor-enabled OS called Whonix I use Qubes and a Whonix gateway literally everyday. Whonix adds a layer of anonymity to your business tasks. Whonix is about as anonymous as an OS can get before it all becomes too inconvenient for normal use. All of our staff are aware that, for anything privacy critical, Whonix is our go-to solution. Anybody who takes privacy seriously should have a Whonix VM at least. Whonix, an operating system you can run in a virtual machine to maximize your online anonymity; it’s ideal for maintaining a secret identity. See even more positive reviews → Das linux-basierte Betriebssystem Whonix setzt von Anfang an auf Sicherheit. Whonix protects user anonymity by routing internet connections through Tor’s network. Tarnkappe - Mit Whonix anonym im Internet surfen Viele Webseiten verfolgen ihre Besucher mit ausgeklügelten Trackingmechanismen. Whonix macht Schluss damit, ohne dass man Browser-Einstellungen ändern muss. The Internet was not designed with anonymity in mind, but things have changed. Anonymity has become a necessary and legitimate objective in many applications. This split design allows the user to remain completely anonymous and mitigates the risk of DNS leaks, which reveal private information such as your web browsing history. Watertight Privacy Architecture Whonix handles all your activity in a virtual machine, forcing all Internet traffic through the Tor network, providing reliable IP hiding and the strongest protection for your IP address. Fully Featured with Advanced Security Components Elite Spy Defense Hiding your identity is harder than just hiding your IP. Whonix provides full spectrum anti-tracking protection. Internet tracking companies don't even need to know your IP address to be able to identify you. They use so-called Browser Fingerprinting which can track you even better than an IP address. Even your personal typing style or your individual computer time can give away your identity. Every website has a unique fingerprint so your Internet history is not even safe with a VPN. Maximum Anonymity Whonix provides maximum anonymity by design, using the best privacy technologies and research. Whonix utilizes Tor, the best anonymity network, which provides an open and distributed relay network to defend against network surveillance. Multiple server hops. Privacy by design. Need to know architecture. Onion-layered encryption. Unlike Virtual Private Networks (VPN), Tor provides anonymity by design and removes trust from the equation. 12 Years of Success For over 12 years we have successfully protected our users from everyday trackers and even from high level attacks. And we're just getting started! Whonix has over 12 years of success. We have successfully protected our users from everyday trackers and even from high level attacks . With the next decade in mind, we are constantly improving Whonix's privacy and security. Cyber Security Best Practices You can't be anonymous without being secure. The security hardened operating system Kicksecure is the core of Whonix. Decades of research by the security community lead to many best practices. Whonix is based on Kicksecure which is a security-hardened Linux distribution that implements the consensus of these reasonable security measures. Bulletproof IP protection Whonix has powerful protection measures against trackers, malware and many more attack vectors trying to get your IP address. Your IP gives away your identity. Cloaking your IP address is difficult because the Internet is not designed for privacy. Whonix solves this problem by forcing all connections through multiple anonymity servers with its Dual-VM Architecture . DNS leaks are impossible with Whonix. And even malware with root privileges cannot discover the user's real IP address. Whonix was thoroughly leak tested through corridor (Tor traffic whitelisting gateway) and other leak tests. Cloaking your typing style Your typing behavior can be used to identify you. Whonix prevents this with a cloak for your keystrokes. Your typing style can be used to track you. To prevent this, Whonix comes with kloak (a keystroke anonymizer) installed by default. 22 more amazing features → Timing Fingerprinting Defense Sophisticated attackers can identify you by the milliseconds that your system clock deviates from standard time. Whonix enhances user anonymity by preventing timing-based fingerprinting through Boot Clock Randomization and secure network time synchronization with sdwdate. Timing-based fingerprinting attacks on Whonix users are mitigated through Boot Clock Randomization and secure network time synchronization via sdwdate (Secure Distributed Web Date). Mouse Movement Anonymization Websites can covertly track mouse movements to identify users. Whonix has built-in systems to re-anonymize your mouse movements. Mouse tracking allows websites to collect detailed behavioral data, such as click patterns and cursor paths, that can be analyzed with AI to identify users across sessions and even across different networks. Whonix includes tools like Kloak and Qubes Event Buffering to disrupt these tracking methods by adding subtle randomness to user input. Not even WE know Whonix has a strong organisational separation which means: Even we do not have access to IP connection logs! Not even WE know. Whonix has a strong organisational separation which means: Even we do not have access to IP connection logs! The Everything Tor OS All traffic is routed through the Tor anonymity network. No exceptions. Whonix is the "All Tor Operating System". The Everything Tor OS. All internet traffic is routed through the Tor anonymity network. No exceptions. Whonix is the "All Tor Operating System". Virtualizer friendly Since Whonix runs in a virtualizer it provides an abstraction layer from the host operating system. This hides hardware serial numbers and prevents host file leaks. Virtualizer Friendly. Since Whonix runs in a virtualizer it provides an abstraction layer from the host operating system. This hides hardware serial numbers and prevents host file leaks. Anonymous Web Server Anonymously hosting a web server such as nginx is extremely difficult. With Whonix it's possible to host an IP hidden server, even for clearnet access! Anonymously hosting a web server such as nginx (or any other type) is extremely difficult. Location / IP hidden servers are usually hosted using Tor onion services. The disadvantage is, that these are only reachable for users of Tor (such as Tor Browser or Whonix users). With Whonix, it's possible to host a location / IP hidden server service while it's reachable over clearnet . A very little known, but very unique and powerful feature. Tor Browser Tor Browser is optimized for anonymity, provides protection from browser fingerprinting. And millions of daily users help you blend in with the crowd. Anonymity loves company. Tor Browser is optimized for anonymity and millions of daily users help you blend in with the crowd. Tor Browser provides protection from browser fingerprinting. Tor Browser is the only serious and actively developed browser designed and recommended for anonymity. The browser is fully featured because it is based on the modern and popular Mozilla Firefox browser. Visit any destination including modern websites such as YouTube. Onion Website for Improved Anonymity Our website offers an onion service option to better protect user anonymity by bypassing traditional DNS and reducing reliance on standard TLS infrastructure. Our website offers an onion service option, enhancing user anonymity through alternative end-to-end encryption that avoids dependence on TLS certificate authorities and the mainstream Domain Name System (DNS). Stream Isolation Distinct applications are isolated and routed through different paths in the network. Distinct applications are routed through different paths in the Tor network. This is called Stream Isolation. Strong Anonymity, privacy and security settings Well researched and tested privacy and security settings improve your anonymity against known attacks. Learn more about our anonymity, privacy and security settings pre-configuration anon-apps-config . Comprehensive Anonymity Documentation and Guides Anonymity thrives on awareness: Whonix provides detailed documentation to help users protect their identities and privacy and minimize online traces. Anonymity thrives on awareness: Dive into Whonix' detailed documentation and guides to learn how to safeguard your identity and maintain privacy across all your activities. Vibrant Community Our vibrant Whonix community features forums, contributors and RSS. Our vibrant Whonix community features Forums, Contributors and RSS CPU Fingerprinting Resistance (TCP ISN Randomization) Without TCP ISN randomization, patterns in outgoing traffic can reveal unique characteristics of a system's CPU, compromising user anonymity. Tirdad helps maintain system anonymity by masking these signals. Prevent de-anonymization of Tor onion services via utilization of the Tirdad kernel module for random ISN generation . Hosting Location Hidden Servers Whonix is the safest way to host Location Hidden Services / Onion Services. Whonix is the safest way to Host Location Hidden Services / Onion Services . Tor Connection Destination Viewer (tor-ctrl-observer) tor-ctrl-observer shows connection information of applications using Tor. tor-ctrl-observer shows connection information of applications using Tor. Applications that are reviewed and pre-configured in Whonix Tor Browser OnionShare Thunderbird KeePassXC VLC Terminal Electrum Bitcoin Monero Freedom Values Open Source We respect user rights to review, scrutinize, modify, and redistribute Whonix. This improves security and privacy for everyone. All the Whonix source code is licensed under OSI Approved Licenses. We respect user rights to review, scrutinize, modify, and redistribute Whonix. This improves security and privacy for everyone. Freedom Software Whonix is Freedom Software and contains software developed by the Free Software Foundation and the GNU Project. Whonix is Freedom Software and contains software developed by the Free Software Foundation and the GNU Project. Research and Implementation Project Whonix is an actively maintained research project making constant improvements; no shortcomings are ever hidden from users. Research and Implementation Project: Whonix makes modest claims and is wary of overconfidence. Whonix is an actively maintained research project making constant improvements; no shortcomings are ever hidden from users. Fully Auditable Whonix is independently verifiable by security experts and software developers around the world. This improves security and privacy for everyone. Whonix is independently verifiable by security experts and software developers around the world; you don’t have to trust developer claims. This improves security and privacy for everyone. Deep Scan Ready Whonix supports offline inspection so you can verify storage and boot components from a clean external environment, without trusting the running system. Deep scan readiness means you can power the device off and inspect it from outside, for example by booting a trusted Live USB or scanning the disk from another computer. This enables full system checks, including bootloader and kernel components, and reduces the risk of malware hiding itself during a scan. Complete respect for privacy and user freedom Whonix respects data privacy principles. We don’t make advertising deals or collect sensitive personal data. Whonix respects data privacy principles. We don’t make advertising deals or collect sensitive personal data. There are no artificial restrictions imposed on possible system configurations . Upcoming Security Enhancements sandbox-app-launcher sandbox-app-launcher is an application launcher that can start each application inside its own restrictive sandbox. Each application runs as its own user, in a bubblewrap sandbox and confined by AppArmor. Reduces the impact of application compromise by isolating each app in its own sandbox and user account, with tight filesystem and permission boundaries enforced via bubblewrap and AppArmor. 8 more Enhancements → Full system Mandatory Access Control (MAC) Full system Mandatory Access Control (MAC) policy - "AppArmor for everything" Extends AppArmor confinement from a handful of apps to the whole system, including core services, so even compromised processes are constrained by least privilege defaults. Untrusted Root User Restrict root to reduce the impact of compromise Aims to limit what a compromised root account can do by confining root with hardened policies, helping prevent escalation from user space compromise into kernel or virtualizer control. Deactivate malware after reboot Deactivate malware after reboot from non-root compromise Designed to make common malware persistence harder by ensuring non-root compromises do not survive a reboot, reducing long-term damage from opportunistic infections. Hardened Linux Kernel Hardened Linux Kernel Provides hardened kernel configurations for hosts and virtual machines to reduce attack surface and enable additional kernel hardening, with a VM-focused build that can disable unnecessary hardware support. Post-quantum resistance Post-quantum resistant signing of releases Adds an additional, post-quantum focused signature layer (for example via codecrypt) to protect release authenticity even if future quantum computers weaken traditional public-key signatures. Mount Options Hardening Mount Options Hardening Applies restrictive filesystem mount flags such as nosuid, nodev and noexec (where feasible) to reduce common exploitation paths and limit the impact of writing payloads to user-writable locations. Multiple boot modes Multiple boot modes for better security (user, live, secureadmin and superadmin) Introduces role-based boot modes so daily use runs with minimal privileges, while maintenance and high-privilege modes require an explicit reboot to opt in, reducing accidental exposure to risky actions. Join the team! Your help is very welcome! As a patron, as a multiplier or even as a contributor! Whonix The most watertight privacy operating system in the world. Dark mode Supported by Power Up Privacy Whonix is proudly supported until 2026 by Power Up Privacy, a privacy advocacy group that seeks to supercharge privacy projects with resources so they can complete their mission of making our world a better place. (Strictly subject to our sponsorship policy.) At Whonix we value freedom and trust, supporting Open Source and Freedom Software By using this website, you acknowledge you have read, understood, and agree to be bound by these agreements: Terms of Service, Privacy Policy, Cookie Policy, E-Sign Consent, DMCA, Imprint 2012- 2026 ENCRYPTED SUPPORT LLC Your support makesall the difference! We believe security software like Whonix needs to remain open source and independent. Would you help sustain and grow the project? Learn more about our 13 year success story and maybe DONATE! Retrieved from "https://www.whonix.org/w/index.php?title=Homepage&oldid=104488" By using our website, you acknowledge that you have read, understood and agreed to our Privacy Policy, Cookie Policy, Terms of Service, and E-Sign Consent. Navigation menu Search