<div class="sections-wrapper">

  <!--{* ----------------- *}-->
  <!--{* 2. Section Banner *}-->

  <div class="section-banner">
    <div class="inner-wrapper">
      <h2 class="slogan">Superior Internet Privacy with Whonix</h2>
      <p class="sub-slogan">As handy as an app - delivering maximum anonymity and security.</p>
      <a href="/wiki/Download" class="call-to-action">Download Now</a>

      <div class="overview-image-and-video-player">
        <input type="checkbox" id="hide-overview-image" aria-label="Hide Overview Image" autocomplete="off" />
        <a href="/wiki/About" class="overview-image" title="Whonix Desktop">
          <img class="overview-image-preview" fetchpriority="high" decoding="sync" loading="eager" alt="Whonix overview preview" width="800" height="450" src="/w/images/a/a5/HP-Hero-image-svg-preview.svg" />
          <img fetchpriority="high" decoding="sync" loading="eager" alt="Whonix overview" width="800" height="450" src="/w/images/6/60/Hero-image-v2.jpg" srcset="
              /w/images/thumb/6/60/Hero-image-v2.jpg/934px-Hero-image-v2.jpg 934w,
              /w/images/thumb/6/60/Hero-image-v2.jpg/900px-Hero-image-v2.jpg 900w,
              /w/images/thumb/6/60/Hero-image-v2.jpg/800px-Hero-image-v2.jpg 800w,
              /w/images/thumb/6/60/Hero-image-v2.jpg/768px-Hero-image-v2.jpg 768w,
              /w/images/thumb/6/60/Hero-image-v2.jpg/640px-Hero-image-v2.jpg 640w,
              /w/images/thumb/6/60/Hero-image-v2.jpg/512px-Hero-image-v2.jpg 512w,
              /w/images/thumb/6/60/Hero-image-v2.jpg/320px-Hero-image-v2.jpg 320w
            " sizes="(max-width: 1000px) 85vw, 934px" />
        </a>
        <video preload="metadata" width="1280" height="720" controls>
          <source data-src="/videos/whonix-explainer.mp4" type="video/mp4" />
          <track src="captions_en.vtt" kind="captions" srclang="en" label="English captions (not available, watch you YouTube instead of captions)">
          Your browser does not support the video tag.
        </video>
      </div>

      <h2 class="learn-more">Learn
        <a href="/wiki/About">What Is Whonix?</a>
      </h2>
      <p class="explainer">
        Whonix gives your desktop<br />
        <img class="pos-2px-up" src="/w/images/thumb/2/2c/True.png/33px-True.png" alt="check" width="22" height="22" /> <b>Maximum privacy and
          anonymity</b> on the Internet<br />
        <img class="pos-2px-up" src="/w/images/thumb/2/2c/True.png/33px-True.png" alt="check" width="22" height="22" /> <b>More reliability and
          security</b>
        than any other tool on the market!
      </p>
    </div>
  </div>

  <!--{* ------------------- *}-->
  <!--{* 3. Section Download *}-->

  <div id="download" class="section-download dark-section">
    <div class="inner-wrapper">
      <h2>
        Download, Install, Run - <a href="/wiki/Reasons_for_Freedom_Software">100% FREE</a>
        <span class="share-tooltip" data-anchor="download"></span>
      </h2>
      <p>
        Whonix <b>runs like an app</b> inside your operating system - <b>keeping you safe and anonymous</b>. Whonix is
        available for
      </p>

      <div class="col-container">

        <div>
          <a href="/wiki/VirtualBox">
            <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/e/ee/Windows_logo_-_2012.svg.png/128px-Windows_logo_-_2012.svg.png" alt="Download for Windows" /></span>
            <span>Windows</span>
          </a>
        </div>

        <div>
          <a href="/wiki/Linux">
            <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/d/d9/Logo-linux-variety-500x500.png/128px-Logo-linux-variety-500x500.png" alt="Download for Linux" /></span>
            <span>Linux</span>
          </a>
        </div>

        <div>
          <a href="/wiki/MacOS">
            <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/9/9e/Logo-apple-500x500.png/128px-Logo-apple-500x500.png" alt="Download for Mac" /></span>
            <span>MacOS</span>
          </a>
        </div>

        <div>
          <a href="/wiki/Qubes">
            <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/9/94/Qubes-logo-blue.png/128px-Qubes-logo-blue.png" alt="Download for Qubes" /></span>
            <span>Qubes</span>
          </a>
        </div>

        <div>
          <a href="/wiki/KVM">
            <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/0/0f/Kvm-new-logo.png/128px-Kvm-new-logo.png" alt="Download for KVM" /></span>
            <span>KVM</span>
          </a>
        </div>

        <div>
          <a href="/wiki/Whonix_on_USB">
            <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/5/5c/Logo-usb-500x500.png/128px-Logo-usb-500x500.png" alt="Whonix on USB" /></span>
            <span>On USB</span>
          </a>
        </div>

        <div>
          <a href="/wiki/Whonix-Host">
            <span class="image-wrapper">
              <img decoding="async" loading="lazy" class="image" src="/w/images/thumb/a/a5/Cd-rom-icon.png/128px-Cd-rom-icon.png" alt="Whonix ISO" />
              <img decoding="async" loading="lazy" class="image coming-soon" src="/w/images/thumb/4/4f/Coming-soon.png/100px-Coming-soon.png" alt="Coming Soon" />
            </span>
            <span>ISO</span>
          </a>
        </div>

      </div>
    </div>
  </div>

  <!--{* ------------------------ *}-->
  <!--{* 3A. Section Competition *}-->

  <div id="vpn" class="section-competition">
    <div class="inner-wrapper">
      <h2>
        Is Whonix <b>safer</b> than VPNs?
        <span class="share-tooltip" data-anchor="vpn"></span>
      </h2>

      <table>
        <tr>
          <th class="empty"></th>
          <th class="whonix top">Whonix</th>
          <th class="vpn top">VPNs</th>
        </tr>

        <tr>
          <th class="cat top">
            <i class="fa-solid fa-mask"></i>
            Hidden IP address (basic)
            <span class="info-tooltip">
              <span>
                Your
                <a href=/wiki/Data_Collection_Techniques#IP_Address>IP address</a>
                acts as a global unique identifier which is linked to your real identity.
                Any website or server you are connecting to knows your IP address.
                Most Internet Service Providers (ISPs) keep a log of IP addresses assigned to you and when
                you used them. The IP address reveals your approximate physical location to any destination
                you connect to.
              </span>
            </span>
          </th>
          <td class="whonix"><img decoding="async" loading="lazy" src="/w/images/thumb/2/2c/True.png/30px-True.png" alt="YES" width="30" height="30" /></td>
          <td class="vpn"><img decoding="async" loading="lazy" src="/w/images/thumb/2/2c/True.png/30px-True.png" alt="YES" width="30" height="30" /></td>
        </tr>

        <tr>
          <th class="cat">
            <i class="fa-solid fa-user-secret"></i>
            Hidden Identity
            <span class="info-tooltip">
              <span>
                Even if your IP is hidden trackers can use <b>"Fingerprinting"</b> techniques to identify you.
                <br /><br />
                Hiding your <b>identity</b> is harder than just hiding your IP!
                <br /><br />
                Whonix
                <a href="#security">protects</a>
                from
                <a href="/wiki/Data_Collection_Techniques#Browser_Fingerprinting">browser fingerprinting</a>,
                and
                <a href="/wiki/Fingerprint#Website_Traffic_Fingerprinting">website traffic fingerprinting</a>.
              </span>
            </span>
          </th>
          <td class="whonix"><img decoding="async" loading="lazy" src="/w/images/thumb/2/2c/True.png/30px-True.png" alt="YES" width="30" height="30" /></td>
          <td class="vpn"><img decoding="async" loading="lazy" src="/w/images/thumb/3/38/False.png/30px-False.png" alt="NO" width="30" height="30" /></td>
        </tr>

        <tr>
          <th class="cat">
            <i class="fa-solid fa-phone-slash"></i>
            No Logging
            <span class="info-tooltip">
              <span>
                Whonix cannot log user IP addresses or activity. This is due to a
                <a href="/wiki/About#architecture">fundamental architecture design</a>
                decision to keep maximum user privacy.
                <br /><br />
                Most VPNs have a policy of not storing any user data. But if they were forced to do so <b>they could
                  start storing user data easily</b>.
              </span>
            </span>
          </th>
          <td class="whonix">
            <img decoding="async" loading="lazy" src="/w/images/thumb/2/2c/True.png/30px-True.png" alt="By Design" width="30" height="30" />
          </td>
          <td class="vpn">
            <img decoding="async" loading="lazy" src="/w/images/thumb/7/7e/5050.png/30px-5050.png" alt="By Policy" width="30" height="30" />
          </td>
        </tr>

        <tr>
          <th class="cat">
            <i class="fa-solid fa-tint"></i>
            Leak Shield
            <span class="info-tooltip">
              <span>
                Even if a connection is tunneled it can be <b>hijacked inside the browser</b>. One leaky connection
                already compromises the user's anonymity.
                <a href="/wiki/About#Security_by_Isolation">Whonix has a watertight leak shield.</a>
                <br /><br />
                Some VPN providers also have a fail-closed mechanism however the quality varies very much and fails
                against malware.
              </span>
            </span>
          </th>
          <td class="whonix"><img decoding="async" loading="lazy" src="/w/images/thumb/2/2c/True.png/30px-True.png" alt="YES" width="30" height="30" /></td>
          <td class="vpn"><img decoding="async" loading="lazy" src="/w/images/thumb/7/7e/5050.png/30px-5050.png" alt="Limited" width="30" height="30" /></td>
        </tr>

        <tr>
          <th class="cat">
            <i class="fa-solid fa-share-alt"></i>
            Server Relays avg.
            <span class="info-tooltip">
              <span>
                The servers used for tunneling MUST NOT know the user. This is only possible if there are
                <a href="/wiki/Why_does_Whonix_use_Tor#Multiple_Server_Hops">
                  <b>multiple</b>
                </a> and
                <a href="/wiki/Why_does_Whonix_use_Tor#Organisational_Separation">
                  <b>independent servers</b>
                </a>
                as relays on a
                <a href=/wiki/Why_does_Whonix_use_Tor#Need_to_Know_Architecture>
                  strict need-to-know basis
                </a>
                and
                <a href=/wiki/Why_does_Whonix_use_Tor#Onion-Layered_Encryption>onion-layered encryption</a>.
                <br /><br />
                Some VPN providers provide double VPN but it’s still <b>the same provider</b> and lacks distributed
                trust by design.
              </span>
            </span>
          </th>
          <td class="whonix">
            3
          </td>
          <td class="vpn">
            1
          </td>
        </tr>

        <tr>
          <th class="cat">
            <i class="fa-solid fa-virus"></i>
            Virus / Malware Protection
            <span class="info-tooltip">
              <span>
                A
                <a href="https://www.kicksecure.com/wiki/Malware_and_Firmware_Trojans" target="_blank">
                  malware (virus)
                </a>
                free system
                <a href="https://www.kicksecure.com/wiki/Malware_and_Firmware_Trojans#The_Importance_of_a_Malware_Free_System" target="_blank">
                  is crucial
                </a>
                because a lot malware is stealing the user's data and identity.
                <b>Whonix is based on Kicksecure</b>, a hardened, well documented Linux so the user is already safer.
                <br /><br />
                Some VPN subscriptions contain anti-malware scanners but
                <a href="https://www.kicksecure.com/wiki/Malware_and_Firmware_Trojans#The_Utility_of_Antivirus_Tools" target="_blank">
                  their capability is limited
                </a>.
                A better approach is to prevent any malware from entering the system through security hardening and
                knowledge.
              </span>
            </span>
          </th>
          <td class="whonix"><img decoding="async" loading="lazy" src="/w/images/thumb/2/2c/True.png/30px-True.png" alt="YES" width="30" height="30" /></td>
          <td class="vpn">
            <img decoding="async" loading="lazy" src="/w/images/thumb/7/7e/5050.png/30px-5050.png" alt="SOME" width="30" height="30" />
          </td>
        </tr>

        <tr class="show-more hide-for-nojs-only">
          <th class="cat">Compare more features â–¼</td>
          <th class="whonix">...</td>
          <td class="vpn">...</td>
        </tr>

        <tr class="show-for-nojs-only">
          <th class="cat">
            <i class="fa-solid fa-keyboard"></i>
            Keyboard Typing Cloak
            <span class="info-tooltip">
              <span>
                Trackers can identify their targets by their <b>keyboard typing style</b>. Whonix prevents this kind of
                attack.
              </span>
            </span>
          </th>
          <td class="whonix">
            <img decoding="async" loading="lazy" src="/w/images/thumb/2/2c/True.png/30px-True.png" alt="YES" width="30" height="30" />
          </td>
          <td class="vpn">
            <img decoding="async" loading="lazy" src="/w/images/thumb/3/38/False.png/30px-False.png" alt="NO" width="30" height="30" />
          </td>
        </tr>

        <tr class="show-for-nojs-only">
          <th class="cat">
            <i class="fa-regular fa-clock"></i>
            Timestamp Attack Protection
            <span class="info-tooltip">
              <span>
                Trackers can identify their targets by <b>minimal divergence from the standard time in the network
                  requests</b> called <a href="/wiki/Time_Attacks">time attacks</a>. Whonix <a href="/wiki/Time_Attacks#mitigations">prevents this kind of
                  attack</a>.
              </span>
            </span>
          </th>
          <td class="whonix">
            <img decoding="async" loading="lazy" src="/w/images/thumb/2/2c/True.png/30px-True.png" alt="YES" width="30" height="30" />
          </td>
          <td class="vpn">
            <img decoding="async" loading="lazy" src="/w/images/thumb/3/38/False.png/30px-False.png" alt="NO" width="30" height="30" />
          </td>
        </tr>

        <tr class="show-for-nojs-only">
          <th class="cat">
            <i class="fa-solid fa-water"></i>
            App Stream Isolation
            <span class="info-tooltip">
              <span>
                In Whonix distinct pre-installed applications are routed through different network paths for maximum
                security.
              </span>
            </span>
          </th>
          <td class="whonix">
            <img decoding="async" loading="lazy" src="/w/images/thumb/2/2c/True.png/30px-True.png" alt="YES" width="30" height="30" />
          </td>
          <td class="vpn">
            <img decoding="async" loading="lazy" src="/w/images/thumb/3/38/False.png/30px-False.png" alt="NO" width="30" height="30" />
          </td>
        </tr>

        <tr class="show-for-nojs-only">
          <th class="cat">
            <i class="fa-solid fa-code"></i>
            Open Source / Freedom
            <span class="info-tooltip">
              <span>
                Whonix has a full dedication to <a href="/wiki/Reasons_for_Freedom_Software">Open Source and Freedom
                  Software</a>. Only some VPNs have open source elements and even less are fully Open Source.
              </span>
            </span>
          </th>
          <td class="whonix">
            <img decoding="async" loading="lazy" src="/w/images/thumb/2/2c/True.png/30px-True.png" alt="YES" width="30" height="30" />
          </td>
          <td class="vpn">
            <img decoding="async" loading="lazy" src="/w/images/thumb/7/7e/5050.png/30px-5050.png" alt="SOME" width="30" height="30" />
          </td>
        </tr>

        <tr>
          <th class="cat bottom">
            <i class="fa-solid fa-dollar-sign"></i>
            Pricing
          </th>
          <td class="whonix">
            FREE or<br />Donation
          </td>
          <td class="vpn bottom">
            $5 - $20<br />per month
          </td>
        </tr>

        <tr>
          <td class="empty"></td>
          <td class="whonix bottom">
            <a href="/wiki/Download">
              Download<br />Whonix now!
            </a>
          </td>
          <td class="empty"></td>
        </tr>
      </table>

      <p class="learn-more-vpns">
        Learn More:
        <a href="/wiki/Whonix_versus_VPNs">
          <i class="fa-solid fa-external-link-alt"></i>
          Whonix versus VPNs
        </a>
      </p>
    </div>
  </div>

  <!--{* ---------------- *}-->
  <!--{* 4. Section Press *}-->

  <div id="press" class="section-press">
    <div class="inner-wrapper">
      <h2>
        Trusted by Security Experts
        <span class="share-tooltip" data-anchor="press"></span>
      </h2>

      <div class="col-container cc-3 justify">

        <a class="card-wrapper" draggable="false" href="https://web.archive.org/web/20140617105809/https://www.wired.com/2014/06/be-anonymous-online" target="_blank">
          <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/e/e5/Wired.svg" alt="Wired Logo" /></span>
          <p>
            For the even more paranoid, there is a lesser-known Tor-enabled OS called Whonix
          </p>
        </a>

        <a class="card-wrapper" draggable="false" href="/wiki/Edward_Snowden_on_Whonix">
          <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/4/44/Snowden.png/300px-Snowden.png" alt="Edward Snowden" /></span>
          <p>
            I use Qubes and a Whonix gateway literally everyday
          </p>
        </a>

        <a class="card-wrapper" draggable="false" href="https://web.archive.org/web/20130724032206/https://www.techrepublic.com/blog/smb-technologist/whonix-adds-a-layer-of-anonymity-to-your-business-tasks/" target="_blank">
          <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/5/52/TechRepublic-ConvertImage.png/300px-TechRepublic-ConvertImage.png" alt="TechRepublic Logo" /></span>
          <p>
            Whonix adds a layer of anonymity to your business tasks.
          </p>
        </a>

        <a class="card-wrapper" draggable="false" href="https://web.archive.org/web/20150311120654/https://www.theguardian.com/technology/2015/mar/06/tips-tricks-anonymous-privacy" target="_blank">
          <span class="image-wrapper"><img decoding="async" loading="lazy" src="/w/images/7/75/The_Guardian_2018.svg" class="image" alt="The
          Guardian Logo" /></span>
          <p>
            Whonix is about as anonymous as an OS can get before it all becomes too inconvenient for normal use.
          </p>
        </a>

        <a class="card-wrapper" draggable="false" href="https://evolution-host.com/" target="_blank">
          <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/d/d6/Evolution-host-logo-text.svg" alt="evolution-host.com Logo" /></span>
          <p>
            All of our staff are aware, for anything privacy critical, Whonix is our go-to solution.
            Anybody who takes privacy serious should have a Whonix VM at least.
          </p>
        </a>

        <a class="card-wrapper" draggable="false" href="https://web.archive.org/web/20200704100018if_/https://theintercept.com/2015/09/16/getting-hacked-doesnt-bad/" target="_blank">
          <span class="image-wrapper"><img decoding="async" loading="lazy" src="/w/images/1/14/The_Intercept_logo.svg" class="image" alt="The Intercept Logo" /></span>
          <p>
            Whonix, an operating system you can run in a virtual machine to maximize your online anonymity; it’s ideal for maintaining a secret identity.
          </p>
        </a>

      </div>

      <div class="mw-collapsible mw-collapsed slider-list-if-js"  >
        <h3>See even more positive reviews →</h3>
        <div class="mw-collapsible-content">

          <div class="col-container cc-3 justify">

            <a class="card-wrapper" draggable="false" href="https://web.archive.org/web/2019*/https://www.chip.de/news/Whonix-bringt-Linux-Sicherheit-auf-Windows_151415693.html" target="_blank">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/6/60/640px-CHIP-Magazin-Logo.svg.png/300px-640px-CHIP-Magazin-Logo.svg.png" alt="Chip Logo" /></span>
              <p>
                Das linux-basierte Betriebs<wbr>system Whonix setzt von Anfang an auf Sicherheit.
              </p>
            </a>

            <a class="card-wrapper" draggable="false" href="https://www.hostingadvice.com/blog/whonix-os-is-preserving-internet-anonymity/" target="_blank">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/d/d0/Ha-logo-stacked-full.png/300px-Ha-logo-stacked-full.png" alt="HostingAdvice.com Logo" /></span>
              <p>
                Whonix protects user anonymity by routing internet connections through Tor’s network.
              </p>
            </a>

            <a class="card-wrapper" draggable="false" href="https://web.archive.org/web/20200321060503/https://www.heise.de/select/ct/2019/15/1563112584099766" target="_blank">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/4/4f/640px-Ct_logo.svg.png/300px-640px-Ct_logo.svg.png" alt="Ct Logo" /></span>
              <p>
                Tarnkappe - Mit Whonix anonym im Internet surfen
              </p>
            </a>

            <a class="card-wrapper" draggable="false" href="https://web.archive.org/web/20200321060403/https://www.heise.de/ratgeber/Mit-Whonix-anonym-im-Internet-surfen-4460100.html" target="_blank">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/b/bc/640px-Heise_online_logo.svg.png/300px-640px-Heise_online_logo.svg.png" alt="Heise Online Logo" /></span>
              <p>
                Viele Webseiten verfolgen ihre Besucher mit aus<wbr>ge<wbr>klü<wbr>gel<wbr>ten
                Trac<wbr>king<wbr>mecha<wbr>nis<wbr>men. Whonix macht Schluss damit, ohne dass man Browser-Einstellungen
                ändern muss.
              </p>
            </a>

            <a class="card-wrapper" draggable="false" href="https://web.archive.org/web/20200301165306/https://cybersecurity.att.com/blogs/security-essentials/how-does-whonix-make-kali-linux-anonymous-how-to-prevent-it" target="_blank">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/d/dd/AT_T_logo_2016.png/300px-AT_T_logo_2016.png" alt="AT&amp;T Logo" /></span>
              <p>
                The Internet was not designed with anonymity in mind, but things have changed. Anonymity has become a
                necessary and legitimate objective in many applications.
              </p>
            </a>

            <a class="card-wrapper" draggable="false" href="https://web.archive.org/web/20200701181129/https://linuxsecurity.com/features/features/7-best-linux-distros-for-security-and-privacy-in-2020" target="_blank">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/9/93/Linux-security-logo-transparent.png/128px-Linux-security-logo-transparent.png" alt="LinuxSecurity.com Logo" /></span>
              <p>
                This split design allows the user to remain completely anonymous and mitigates the risk of DNS leaks, which
                reveal private information such as your web browsing history.
              </p>
            </a>

          </div>
        </div>
      </div>

    </div>
  </div>

  <!--{* ------------------ *}-->
  <!--{* 5. Section Explain *}-->

  <div id="explain" class="section-explain dark-section">
    <div class="inner-wrapper">
      <h2>
        Watertight Privacy Architecture
        <span class="share-tooltip" data-anchor="explain"></span>
      </h2>
      <a class="illustration" href="/wiki/About#Whonix_Architecture">
        <span class="image-wrapper">
          <img class="image" decoding="async" loading="lazy" width="780" height="395" src="/w/images/thumb/9/9d/Whonix-concept-illustration.png/800px-Whonix-concept-illustration.png" alt="Whonix functionality illustration" />
        </span>
      </a>
      <p>
        Whonix handles all your activity in a virtual machine, forcing all Internet traffic through the 
        <a href="/wiki/Why_does_Whonix_use_Tor">Tor network</a>, providing 
        <a href="/wiki/Reliable_IP_Hiding">reliable IP hiding</a> and the strongest protection for your 
        <a href="/wiki/Data_Collection_Techniques#IP_Address">IP address</a>.
      </p>
    </div>
  </div>

  <!--{* ------------------- *}-->
  <!--{* 7. Section Features *}-->

  <div id="security" class="section-features">
    <div class="inner-wrapper">
      <h2>
        Fully Featured with Advanced Security Components
        <span class="share-tooltip" data-anchor="security"></span>
      </h2>

      <div class="col-container cc-3 justify">

        <a href="/wiki/About#Full_Spectrum_Anti-Tracking_Protection" class="card-wrapper" draggable="false" id="explain-spy">
          <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Elite Spy Defense" src="/w/images/thumb/c/cb/Spy.jpg/300px-Spy.jpg" /></span>
          <h3>Elite Spy Defense</h3>
          <p>
            Hiding your identity is harder than just hiding your IP. Whonix provides a full spectrum anti-tracking
            protection.
          </p>
        </a>

        <a href="/wiki/Why_does_Whonix_use_Tor" class="card-wrapper" draggable="false" id="explain-tor">
          <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Maximum Anonymity" src="/w/images/thumb/b/bb/Anonymous.jpg/300px-Anonymous.jpg" /></span>
          <h3>Maximum Anonymity</h3>
          <p>
            Whonix provides maximum anonymity by design by utilizing the best privacy technologies and research.
          </p>
        </a>

        <a href="/wiki/History" class="card-wrapper" draggable="false" id="explain-success">
          <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="12 Years of Success" src="/w/images/thumb/2/20/10-year-promo.jpg/300px-10-year-promo.jpg" /></span>
          <h3>12 Years of Success</h3>
          <p>
            For over 12 years we have successfully protected our users from everyday trackers
            and even from high level attacks. And we're just getting started!
          </p>
        </a>

        <a href="https://www.kicksecure.com/" target="_blank" class="card-wrapper" draggable="false" id="explain-kicksecure">
          <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Cyber Security Best Practices" src="/w/images/thumb/2/27/Kicksecure-promo.jpg/300px-Kicksecure-promo.jpg" /></span>
          <h3>Cyber Security Best Practices</h3>
          <p>
            You can't be anonymous without being secure. Security hardened operating system Kicksecure is the core of
            Whonix.
          </p>
        </a>

        <a href="/wiki/About#Whonix_Architecture" class="card-wrapper" draggable="false" id="explain-antileak">
          <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Bulletproof IP protection" src="/w/images/thumb/c/cd/Matrix-s.jpg/300px-Matrix-s.jpg" /></span>
          <h3>Bulletproof IP protection</h3>
          <p>
            Whonix has powerful protection measures against trackers, malware and many more attack vectors to get your
            IP address.
          </p>
        </a>

        <a href="/wiki/Keystroke_Deanonymization" class="card-wrapper" draggable="false" id="explain-keystrokes">
          <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Cloaking your typing style" src="/w/images/thumb/8/81/Typing-fingerprint.jpg/300px-Typing-fingerprint.jpg" /></span>
          <h3>Cloaking your typing style</h3>
          <p>
            Your typing behavior can be used to identify you. Whonix prevents this with a cloak for your keystrokes.
          </p>
        </a>

      </div>

      <div class="mw-collapsible mw-collapsed slider-list-if-js"  >
        <h3>22 more amazing features →</h3>
        <div class="mw-collapsible-content">

          <div class="col-container cc-3 justify">

            <a href="/wiki/Dev/TimeSync" class="card-wrapper" draggable="false" id="explain-time">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Time Attack Protection" src="/w/images/thumb/6/6d/Stopwatch.jpg/300px-Stopwatch.jpg" /></span>
              <h3>Time Attack Protection</h3>
              <p>
                Sophisticated attackers can identify you by the milliseconds that your system clock deviates from
                standard time. Whonix prevents this.
              </p>
            </a>

            <a href="/wiki/Why_does_Whonix_use_Tor#Organisational_Separation" class="card-wrapper" draggable="false" id="explain-secret">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Strong organisational separation" src="/w/images/thumb/2/2e/Unknowable-promo.jpg/300px-Unknowable-promo.jpg" /></span>
              <h3>Not even WE know</h3>
              <p>
                Whonix has a strong organisational separation which means: Even we do not have access to IP connection
                logs!
              </p>
            </a>

            <a href="/wiki/Why_does_Whonix_use_Tor" class="card-wrapper" draggable="false" id="explain-alltor">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="The Everything Tor OS" src="/w/images/thumb/e/ea/Tor-everything.jpg/300px-Tor-everything.jpg" /></span>
              <h3>The Everything Tor OS</h3>
              <p>
                All traffic is routed through the Tor anonymity network. No exceptions. Whonix is the "All Tor
                Operating System".
              </p>
            </a>

            <a href="/wiki/Protocol-Leak-Protection_and_Fingerprinting-Protection" class="card-wrapper" draggable="false" id="explain-virtualizer">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Virtualizer friendly" src="/w/images/thumb/4/42/Virtualizer-friendly-promo.jpg/300px-Virtualizer-friendly-promo.jpg" /></span>
              <h3>Virtualizer friendly</h3>
              <p>
                Since Whonix runs in a virtualizer it provides an abstraction layer from the host operating system.
                This hides hardware serial numbers and prevents host file leaks.
              </p>
            </a>

            <a href="/wiki/Hosting_Location_Hidden_Services" class="card-wrapper" draggable="false" id="explain-anonserver">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Anonymous Web Server" src="/w/images/thumb/2/28/Anonymous-server-promo.jpg/300px-Anonymous-server-promo.jpg" /></span>
              <h3>Anonymous Web Server</h3>
              <p>
                Anonymously hosting a web server such as nginx is extremely difficult. With Whonix it's possible to
                host an IP hidden server, even for clearnet access!
              </p>
            </a>

            <a href="/wiki/Tor_Browser" class="card-wrapper" draggable="false" id="explain-torbrowser">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Tor Browser as Standard" src="/w/images/thumb/d/d2/Torbrowser-promo.jpg/300px-Torbrowser-promo.jpg" /></span>
              <h3>Tor Browser</h3>
              <p>
                Tor Browser is optimized for anonymity, provides protection from
                browser fingerprinting.
                And millions of daily users help you blend in with the crowd.
                Anonymity loves company.
              </p>
            </a>

            <a href="https://github.com/Kicksecure/security-misc" target="_blank" class="card-wrapper" draggable="false" id="explain-kernel">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Kernel Self Protection Settings" src="/w/images/thumb/8/8d/Tux-halo-promo.jpg/300px-Tux-halo-promo.jpg" /></span>
              <h3>Kernel Self Protection Settings</h3>
              <p>
                Whonix uses strong Kernel Hardening Settings as recommended by the Kernel Self Protection Project
                (KSPP).
              </p>
            </a>

            <a href="/wiki/VM_Live_Mode" class="card-wrapper" draggable="false" id="explain-livemode">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover image-left" alt="Live Mode" src="/w/images/thumb/d/d9/Whonix-live-mode.jpg/300px-Whonix-live-mode.jpg" /></span>
              <h3>Live Mode</h3>
              <p>
                Booting into Live Mode is as simple as choosing Live Mode in the boot menu.
                After the session, all data will be gone.
              </p>
            </a>

            <a href="https://www.kicksecure.com" target="_blank" class="card-wrapper" draggable="false" id="explain-linuxbased">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Based on Linux" src="/w/images/thumb/7/7d/Linux-based-whonix-promo.jpg/300px-Linux-based-whonix-promo.jpg" /></span>
              <h3>Based on Linux</h3>
              <p>
                Linux is highly reliable, secure, free and open source. That's why Whonix is based on Kicksecure which
                is based on Linux.
              </p>
            </a>

            <a href="/wiki/Forcing_.onion_on_Project" class="card-wrapper" draggable="false" id="explain-onionwebsite">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" src="/w/images/thumb/3/33/Onion-website-promo.jpg/300px-Onion-website-promo.jpg" alt="Onion Website Option" /></span>
              <h3>Onion Website Option</h3>
              <p>
                Our website offers an alternative onion version. This offers a higher connection security between the
                user and the server.
              </p>
            </a>

            <a href="/wiki/Advanced_Documentation" class="card-wrapper" draggable="false" id="explain-firewall">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" alt="Advanced Firewall" src="/w/images/thumb/8/82/Firewall-symbol.png/300px-Firewall-symbol.png" /></span>
              <h3>Advanced Firewall</h3>
              <p>
                Our Firewall is configured specifically for anonymously and securely using the Internet.
              </p>
            </a>

            <!--
              <a href="/wiki/Anbox" class="card-wrapper" draggable="false" id="explain-android">
                <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" alt="Android App Support"
                    src="/w/images/thumb/1/1f/Anbox.jpg/300px-Anbox.jpg" /></span>
                <h3>Android App Support</h3>
                <p>
                  Run Android applications using Anbox or Whonix-Custom-Workstation using Android.
                </p>
              </a>
-->

            <a href="/wiki/Malware" class="card-wrapper" draggable="false" id="explain-virus">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" alt="Virus Protection" src="/w/images/thumb/c/cf/Shield.png/300px-Shield.png" /></span>
              <h3>Virus Protection</h3>
              <p>
                Whonix provides additional security hardening measures and user education for better
                protection from virus attacks.
              </p>
            </a>

            <a href="https://github.com/Kicksecure/security-misc" target="_blank" class="card-wrapper" draggable="false" id="explain-brute">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Brute Force Defense" src="/w/images/thumb/d/d7/Franck-v-_E1PQXKUkMw-unsplash.jpg/300px-Franck-v-_E1PQXKUkMw-unsplash.jpg" /></span>
              <h3>Brute Force Defense</h3>
              <p>
                Whonix protects Linux user accounts against brute force attacks by using pam faillock.
              </p>
            </a>

            <a href="/wiki/AppArmor" class="card-wrapper" draggable="false" id="explain-apparmor">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" alt="Risk Minimization" src="/w/images/thumb/e/ec/AppArmor-logo-promo.png/300px-AppArmor-logo-promo.png" /></span>
              <h3>Risk Minimization</h3>
              <p>
                AppArmor profiles restrict the capabilities of commonly used, high-risk applications.
              </p>
            </a>

            <a href="/wiki/Why_does_Whonix_use_Tor" class="card-wrapper" draggable="false" id="explain-stream">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" alt="Stream Isolation" src="/w/images/thumb/c/cf/Stream-isolation-promo.jpg/450px-Stream-isolation-promo.jpg" /></span>
              <h3>Stream Isolation</h3>
              <p>
                Distinct applications are isolated and routed through different paths in the network.
              </p>
            </a>

<!--
            <a href="/wiki/vanguards" class="card-wrapper" draggable="false" id="explain-vanguards">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" alt="Discovery / Traffic Analysis Attack Protection" src="/w/images/thumb/f/fd/Vanguard.png/300px-Vanguard.png" /></span>
              <h3>Discovery / Traffic Analysis Attack Protection</h3>
              <p>
                Whonix provides vanguards against guard discovery and related traffic analysis attacks.
              </p>
            </a>
-->

            <a href="https://github.com/Kicksecure/security-misc" target="_blank" class="card-wrapper" draggable="false" id="explain-account">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" alt="Strong Linux User Account Separation" src="/w/images/thumb/8/87/Account-separation-promo.png/300px-Account-separation-promo.png" /></span>
              <h3>Strong Linux User Account Separation</h3>
              <p>
                Linux User Account Separation is not always a given on Linux systems. In Whonix it is.
              </p>
            </a>

            <a href="https://github.com/Whonix/anon-apps-config" target="_blank" class="card-wrapper" draggable="false" id="explain-settings">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" alt="Strong Anonymity" src="/w/images/thumb/6/61/Preferences_system.png/300px-Preferences_system.png" /></span>
              <h3>Strong Anonymity, privacy and security settings</h3>
              <p>
                Well researched and tested privacy and security settings improve your anonymity against known attacks.
              </p>
            </a>

            <a href="/wiki/Documentation" class="card-wrapper" draggable="false" id="explain-docs">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Extensive Documentation" src="/w/images/thumb/5/55/Advanceddocumentation213123.jpg/300px-Advanceddocumentation213123.jpg" /></span>
              <h3>Extensive Documentation</h3>
              <p>
                The more you know, the safer you can be: Extensive Whonix Documentation
              </p>
            </a>

            <a href="https://forums.whonix.org" target="_blank" class="card-wrapper" draggable="false" id="explain-community">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" alt="Vibrant Community" src="/w/images/thumb/a/af/Discourse_logo.png/300px-Discourse_logo.png" /></span>
              <h3>Vibrant Community</h3>
              <p>
                Our vibrant Whonix community features Forums, Contributors and RSS.
              </p>
            </a>

            <a href="/wiki/Dev/Strong_Linux_User_Account_Isolation#Console_Lockdown" class="card-wrapper" draggable="false" id="explain-console">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Console Lockdown" src="/w/images/thumb/7/74/Console-lockdown.jpg/300px-Console-lockdown.jpg" /></span>
              <h3>Console Lockdown</h3>
              <p>
                Legacy login methods can be a security risk. Console Lockdown disables them for improved security
                hardening.
              </p>
            </a>

            <a href="https://github.com/Whonix/swap-file-creator" target="_blank" class="card-wrapper" draggable="false" id="explain-swap">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" alt="Swap File Creator" src="/w/images/thumb/7/7b/File-swap-promo.jpg/450px-File-swap-promo.jpg" /></span>
              <h3>Swap File Creator</h3>
              <p>
                Running low on RAM isn't a security problem with swap-file-creator. It will create an encrypted swap
                file.
              </p>
            </a>

            <a href="/wiki/Dev/Entropy" class="card-wrapper" draggable="false" id="explain-entropy">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Entropy Enhancements" src="/w/images/thumb/e/ec/Entropy-promo.jpg/300px-Entropy-promo.jpg" /></span>
              <h3>Entropy Enhancements</h3>
              <p>
                Better encryption thanks to preinstalled random number generators.
              </p>
            </a>

            <a href="https://github.com/Kicksecure/tirdad" target="_blank" class="card-wrapper" draggable="false" id="explain-tirdad">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="CPU Information Leak Protection" src="/w/images/thumb/a/a9/Data-leak.jpg/300px-Data-leak.jpg" /></span>
              <h3>CPU Information Leak Protection (TCP ISN)</h3>
              <p>
                Prevent de-anonymization of Tor onion services via utilization
                of the Tirdad kernel module for random ISN generation.
              </p>
            </a>

            <a href="/wiki/Hosting_Location_Hidden_Services" class="card-wrapper" draggable="false" id="explain-hidden">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" alt="Hosting Location Hidden Servers" src="/w/images/thumb/0/07/Computer_n_screen.png/300px-Computer_n_screen.png" /></span>
              <h3>Hosting Location Hidden Servers</h3>
              <p>
                Whonix is the safest way to Host Location Hidden Services / Onion Services.
              </p>
            </a>

            <a href="/wiki/Tor-ctrl-observer" class="card-wrapper" draggable="false" id="explain-observer">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" alt="Tor Connection Destination Viewer" src="/w/images/thumb/7/79/TorControl12312.png/300px-TorControl12312.png" /></span>
              <h3>Tor Connection Destination Viewer (tor-ctrl-observer)</h3>
              <p>
                tor-ctrl-observer shows connection information of applications using Tor.
              </p>
            </a>

            <a href="/wiki/Trust#canary" class="card-wrapper" draggable="false" id="explain-canary">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Warrant Canary" src="/w/images/thumb/4/49/Canary-promo.jpg/300px-Canary-promo.jpg?20220902121433" /></span>
              <h3>Warrant Canary</h3>
              <p>
                A canary confirms that no warrants have ever been served on the Whonix project.
              </p>
            </a>

            <a href="/wiki/About" class="card-wrapper" draggable="false" id="explain-debian">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/3/30/Debian.png/300px-Debian.png" alt="Based on Debian" /></span>
              <h3>Based on Debian</h3>
              <p>
                Whonix is based on Debian, one of the most reliable Linux distributions.
              </p>
            </a>

            <a href="/wiki/Verifying_Software_Signatures" class="card-wrapper" draggable="false" id="explain-signed">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/7/77/Key-lock-gpg.png/300px-Key-lock-gpg.png" alt="Digitally signed releases" /></span>
              <h3>Digitally signed releases</h3>
              <p>
                Downloads are signed so genuine Whonix releases can be verified.
              </p>
            </a>

            <a href="https://www.kicksecure.com/wiki/SUID_Disabler_and_Permission_Hardener" target="_blank" class="card-wrapper" draggable="false" id="explain-sui-disabler">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" src="/w/images/thumb/e/ed/Disablesuidbinary.jpg/300px-Disablesuidbinary.jpg" alt="Permission Hardener" /></span>
              <h3>SUID Disabler and Permission Hardener</h3>
              <p>SUID Disabler and Permission Hardener enhances system security by strengthening the isolation of Linux user accounts and more.</p>
            </a>

          </div>
        </div>
      </div>
    </div>

  </div>

  <!--{* ----------------- *}-->
  <!--{* 7.1. Section Apps *}-->

  <div class="section-apps">
    <div class="inner-wrapper">
      <h2>
        Applications that are reviewed and pre-configured in Whonix
      </h2>

      <div class="col-container cc-5">

        <a href="/wiki/Tor_Browser">
          <span class="image-wrapper"><img decoding="async" loading="lazy" src="/w/images/thumb/3/3a/Torbrowser_icon.png/64px-Torbrowser_icon.png" alt="Tor Browser Symbol" /></span>
          <span>Tor Browser</span>
        </a>

        <a href="/wiki/OnionShare">
          <span class="image-wrapper"><img decoding="async" loading="lazy" src="/w/images/thumb/0/0d/OnionShare_logo.png/64px-OnionShare_logo.png" alt="OnionShare Symbol" /></span>
          <span>OnionShare</span>
        </a>

        <a href="/wiki/Encrypted_Email_with_Thunderbird_and_Enigmail">
          <span class="image-wrapper"><img decoding="async" loading="lazy" src="/w/images/thumb/b/b1/Thunderbird256.png/64px-Thunderbird256.png" alt="Encrypted Email Symbol" /></span>
          <span>Thunderbird</span>
        </a>

        <a href="/wiki/Passwords">
          <span class="image-wrapper"><img decoding="async" loading="lazy" src="/w/images/thumb/5/51/KeePassXC.png/64px-KeePassXC.png" alt="KeePassXC Symbol" /></span>
          <span>KeePassXC</span>
        </a>

        <a href="/wiki/Software#Media_Player">
          <span class="image-wrapper"><img decoding="async" loading="lazy" src="/w/images/thumb/c/cd/2000px-VLC_Icon.svg.png/64px-2000px-VLC_Icon.svg.png" alt="VLC Symbol" /></span>
          <span>VLC</span>
        </a>

        <a href="/wiki/Software#Terminal">
          <span class="image-wrapper"><img decoding="async" loading="lazy" src="/w/images/thumb/c/c2/Utilities-terminal.png/64px-Utilities-terminal.png" alt="Terminal Symbol" /></span>
          <span>Terminal</span>
        </a>

        <a href="/wiki/Electrum">
          <span class="image-wrapper"><img decoding="async" loading="lazy" src="/w/images/thumb/6/63/Electrum-appimage.png/64px-Electrum-appimage.png" alt="Electrum Symbol" /></span>
          <span>Electrum</span>
        </a>

        <a href="/wiki/Bitcoin">
          <span class="image-wrapper"><img decoding="async" loading="lazy" src="/w/images/thumb/2/29/BC_Logo_.png/64px-BC_Logo_.png" alt="Bitcoin Symbol" /></span>
          <span>Bitcoin</span>
        </a>

        <a href="/wiki/Monero">
          <span class="image-wrapper"><img decoding="async" loading="lazy" src="/w/images/thumb/0/05/Monero-symbol-1280.png/64px-Monero-symbol-1280.png" alt="Monero Symbol" /></span>
          <span>Monero</span>
        </a>

      </div>
    </div>
  </div>

  <!--{* ------------------- *}-->
  <!--{* 7.2. Section Values *}-->

  <div id="values" class="section-values">
    <div class="inner-wrapper">
      <h2>
        Freedom Values
        <span class="share-tooltip" data-anchor="values"></span>
      </h2>

      <div class="col-container cc-3 justify">

          <a href="https://github.com/Whonix" target="_blank" class="card-wrapper" draggable="false" id="explain-opensource">
            <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" alt="Open Source" src="/w/images/thumb/0/09/Osi_standard_logo_0.png/300px-Osi_standard_logo_0.png" /></span>
            <h3>Open Source</h3>
            <p>
              We respect user rights to review, scrutinize, modify, and redistribute Whonix. This improves security
              and privacy for everyone.
            </p>
          </a>

          <a href="/wiki/Reasons_for_Freedom_Software" class="card-wrapper" draggable="false" id="explain-freedom">
            <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" alt="Freedom Software" src="/w/images/thumb/a/a3/Heckert_gnu.big.png/300px-Heckert_gnu.big.png" /></span>
            <h3>Freedom Software</h3>
            <p>
              Whonix is Freedom Software and contains software developed by the Free Software Foundation
              and the GNU Project.
            </p>
          </a>

          <a href="/wiki/What_we_do" class="card-wrapper" draggable="false" id="explain-research">
            <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/7/7f/Cornues.png/300px-Cornues.png" alt="Research and Implementation Project" /></span>
            <h3>Research and Implementation Project</h3>
            <p>
              Whonix is an actively maintained research project
              making constant improvements; no shortcomings are ever hidden from users.
            </p>
          </a>

          <a href="/wiki/Reasons_for_Freedom_Software" class="card-wrapper" draggable="false" id="explain-auditable">
            <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Fully Auditable" src="/w/images/thumb/4/44/Bho78-4ycp0.jpg/300px-Bho78-4ycp0.jpg" /></span>
            <h3>Fully Auditable</h3>
            <p>
              Whonix is independently verifiable by security experts and software developers around the world.
              This improves security and privacy for everyone.
            </p>
          </a>

          <a href="/wiki/Reasons_for_Freedom_Software#No_Intentional_User_Freedom_Restrictions" class="card-wrapper" draggable="false" id="explain-respect">
            <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Complete respect for privacy and user freedom" src="/w/images/thumb/e/ef/Respect-freedom-symbol.jpg/300px-Respect-freedom-symbol.jpg" /></span>
            <h3>Complete respect for privacy and user freedom</h3>
            <p>
              Whonix respects data privacy principles. We don’t make advertising deals or collect sensitive personal
              data.
            </p>
          </a>

      </div>
    </div>
  </div>

  <!--{* ------------------- *}-->
  <!--{* 8. Section Upcoming *}-->

  <div id="upcoming" class="section-upcoming dark-section">
    <div class="inner-wrapper">
      <h2>
        Upcoming Security Enhancements
        <span class="share-tooltip" data-anchor="upcoming"></span>
      </h2>

      <div class="col-container cc-3 justify">

<!--
        <a href="/wiki/Linux_Kernel_Runtime_Guard_LKRG" class="card-wrapper" draggable="false">
          <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" src="/w/images/thumb/a/a7/P_lkrg2.png/300px-P_lkrg2.png" alt="LKRG" /></span>
          <p>
            Linux Kernel Runtime Guard (LKRG) performs runtime integrity checking of the Linux kernel and
            detection of security vulnerability exploits against the kernel.
          </p>
        </a>
-->

<!--
        <a href="https://www.kicksecure.com/wiki/Hardened_Malloc_Light" target="_blank" class="card-wrapper" draggable="false">
          <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" src="/w/images/thumb/a/a3/Kicksecurehardenedmalloc.jpg/300px-Kicksecurehardenedmalloc.jpg" alt="Hardened Malloc Light" /></span>
          <p>
            Hardened Malloc Light is a hardened memory allocator which can be used with many applications to
            increase
            security which is already installed by default and will be enabled by default.
          </p>
        </a>
-->

        <a href="/wiki/Sandbox-app-launcher" class="card-wrapper" draggable="false">
          <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" src="/w/images/thumb/6/60/Sandboxing123123.png/300px-Sandboxing123123.png" alt="Sandboxed Application Launcher" /></span>
          <p>sandbox-app-launcher is an application launcher that can start each application inside its own
            restrictive sandbox. Each application runs as its own user, in a bubblewrap sandbox and confined by
            AppArmor.</p>
        </a>

      </div>

      <div class="mw-collapsible mw-collapsed slider-list-if-js"  >
        <h3>8 more Enhancements →</h3>
        <div class="mw-collapsible-content">
          <div class="col-container cc-3 justify">

            <a href="/wiki/Apparmor-profile-everything" target="_blank" class="card-wrapper" draggable="false">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" src="/w/images/thumb/7/79/Mandatoryaccesscontrol.jpg/300px-Mandatoryaccesscontrol.jpg" alt="AppArmor" /></span>
              <p>Full system Mandatory Access Control (MAC) policy - "AppArmor for everything"</p>
            </a>

            <a href="https://forums.whonix.org/t/untrusted-root-does-it-make-sense-to-try-to-improve-security-by-restricting-root/7998" target="_blank" class="card-wrapper" draggable="false">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" src="/w/images/thumb/5/53/Untrustedrootaccess.jpg/300px-Untrustedrootaccess.jpg" alt="Restricting root" /></span>
              <p>Untrusted Root User</p>
            </a>

<!--
            <a href="https://forums.whonix.org/t/allow-loading-signed-kernel-modules-by-default-disallow-kernel-module-loading-by-default/7880" target="_blank" class="card-wrapper" draggable="false">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image enforce-kernel" src="/w/images/thumb/e/e1/Verifykernel.png/300px-Verifykernel.png" alt="Kernel module Signatur" /></span>
              <p>Enforce kernel module software signature verification</p>
            </a>
-->

            <a href="/wiki/Dev/VirusForget" class="card-wrapper" draggable="false">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image virus-forge" src="/w/images/thumb/d/da/Text_x_patch.png/300px-Text_x_patch.png" alt="Deactivate malware" /></span>
              <p>Deactivate malware after reboot from non-root compromise</p>
            </a>

            <a href="https://github.com/Kicksecure/hardened-kernel" target="_blank" class="card-wrapper" draggable="false">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" src="/w/images/thumb/6/6d/Hardenkernel.jpg/300px-Hardenkernel.jpg" alt="Hardened Kernel" /></span>
              <p>Hardened Linux Kernel</p>
            </a>

            <a href="https://forums.whonix.org/t/use-codecrypt-to-sign-whonix-releases/7844/2" target="_blank" class="card-wrapper" draggable="false">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" src="/w/images/thumb/9/90/Postquantum.jpg/300px-Postquantum.jpg" alt="Codecrypt" /></span>
              <p>Post-quantum cryptography resistant signing of releases</p>
            </a>

            <a href="https://forums.whonix.org/t/re-mount-home-and-other-with-noexec-and-nosuid-among-other-useful-mount-options-for-better-security/7707" target="_blank" class="card-wrapper" draggable="false">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" src="/w/images/thumb/7/7b/Mountoptions.jpg/300px-Mountoptions.jpg" alt="Mount Options Hardening" /></span>
              <p>Mount Options Hardening</p>
            </a>

            <a href="https://forums.whonix.org/t/multiple-boot-modes-for-better-security-persistent-root-persistent-noroot-live-root-live-noroot/7708" target="_blank" class="card-wrapper" draggable="false">
              <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" src="/w/images/thumb/7/7c/Multipleboot.jpg/300px-Multipleboot.jpg" alt="Boot Modes" /></span>
              <p>Multiple boot modes for better security (user, live, secureadmin and superadmin)</p>
            </a>

          </div>

        </div>

      </div>

    </div>
  </div>

  <!--{* --------------------- *}-->
  <!--{* 9. Section Investors *}-->

  <!--
  <div id="investors" class="section-investor">
    <div class="inner-wrapper">
      <h2>
        Investors
        <span class="share-tooltip" data-anchor="investors"></span>
      </h2>
      <p>
        Interested in becoming an investor? See
        <a href="/wiki/Investors">Project Metrics and contact details</a>.
      </p>
      <a href="/wiki/Investors" class="image-link">
        <img class="image" decoding="async" loading="lazy" src="/w/images/thumb/f/f7/Shaking-hands.jpg/800px-Shaking-hands.jpg" alt="Investor shaking hands" />
      </a>
    </div>
  </div>
  -->

  <!--{* ---------------- *}-->
  <!--{* 10. Section Help *}-->

  <div id="contribute" class="section-help">
    <div class="inner-wrapper">
      <h2>
        Join the team!
        <span class="share-tooltip" data-anchor="contribute"></span>
      </h2>
      <div>
        <a href="/wiki/Contribute">
          <img decoding="async" loading="lazy" class="image" src="/w/images/thumb/6/62/Digital-nomad.jpg/450px-Digital-nomad.jpg" alt="Help Welcome" />
          <span><b>Your help is very welcome!</b> As a patron, as a multiplier or even as a contributor!</span>
        </a>
      </div>
    </div>
  </div>
</div>

<!--{* ---------- *}-->
<!--{* 11. Modals *}-->

<!--{* 11.1. Features *}-->

<div id="modal-explain-antileak" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Anti Leak Protection" src="/w/images/thumb/1/17/Whonix-concept-detailed.jpg/600px-Whonix-concept-detailed.jpg" /></span>
  <p>
    Your IP gives away your identity. Cloaking your IP address is difficult because the Internet is not designed for
    privacy. Whonix solves this problem by forcing all connections through
    <a href="/wiki/Why_does_Whonix_use_Tor#Multiple_Server_Hops">
      multiple anonymity servers
    </a>
    with
    <a href="/wiki/About#Security_by_Isolation">
      its Dual-VM Architecture
    </a>.
  </p>
  <p>
    DNS leaks are impossible with Whonix.
    And even malware with root privileges cannot discover the user's real IP address.
    Whonix was thoroughly leak tested through
    <a href="https://github.com/Whonix/corridor" title="Corridor" target="_blank">corridor</a>
    (Tor traffic whitelisting gateway) and other
    <a href="/wiki/Dev/Leak_Tests">leak tests</a>.
  </p>
</div>

<div id="modal-explain-spy" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Strong Spy Defense" src="/w/images/thumb/c/cb/Spy.jpg/600px-Spy.jpg" /></span>
  <p>
    Internet tracking companies
    <a href=/wiki/About#Full_Spectrum_Anti-Tracking_Protection>
      don't even need to know your IP address
    </a>
    to be able to identify you. They use so-called
    <a href="/wiki/Data_Collection_Techniques#Browser_Fingerprinting">Browser Fingerprinting</a>
    which can track you even better than an IP address.
  </p>
  <p>
    Even your
    <a href="/wiki/Keystroke_Deanonymization">personal typing style</a>
    or
    <a href="/wiki/Time_Attacks">your individual computer time</a>
    can give away your identity.
    <a href="/wiki/Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider">
      Every website has a unique fingerprint
    </a>
    so your Internet history is not even safe with a VPN.
  </p>
</div>

<div id="modal-explain-livemode" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Live Mode" src="/w/images/thumb/d/d9/Whonix-live-mode.jpg/600px-Whonix-live-mode.jpg" /></span>
  <p>
    Booting a VM into 
    <a href="/wiki/Live_Mode">Live Mode</a>
    is as simple as choosing Live Mode in the boot menu.

    Alternatively, Debian, Kicksecure, and perhaps other Debian-based hosts can boot their existing host operating system into Live Mode.

    After the session, all data will be gone.
  </p>
</div>

<div id="modal-explain-linuxbased" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Based on Linux" src="/w/images/thumb/7/7d/Linux-based-whonix-promo.jpg/600px-Linux-based-whonix-promo.jpg" /></span>
  <p>
    Linux is highly reliable and secure. Its open source and freedom paradigm sets it apart from other OS.
    That's why Whonix is based on Kicksecure
    <a href="https://www.kicksecure.com" target="_blank">
      which is based on Linux.
    </a>
  </p>
</div>

<div id="modal-explain-onionwebsite" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Onion Website Option" src="/w/images/thumb/3/33/Onion-website-promo.jpg/600px-Onion-website-promo.jpg" /></span>
  <p>
    Our website offers an alternative onion version which offers a higher connection security between the user and the
    server.
    This is because connections over onions are providing an alternative end-to-end encryption which is independent from
    <a href="/wiki/Forcing_.onion_on_Project">
      flawed TLS certificate authorities
    </a>
    and the mainstream Domain Name System (DNS).
  </p>
</div>

<div id="modal-explain-tor" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Usage of Tor Network" src="/w/images/thumb/b/bb/Anonymous.jpg/600px-Anonymous.jpg" /></span>
  <p>
    Whonix utilizes <a href="/wiki/Why_does_Whonix_use_Tor">Tor, the best anonymity network</a>,
    which provides an open and distributed relay network to defend against
    network surveillance.
  </p>
  <p>
    Multiple server hops. Privacy by design. Need to know architecture. Onion-layered encryption.
    Unlike Virtual Private Networks (VPN), Tor provides anonymity by design and removes trust from the equation.
  </p>
</div>

<div id="modal-explain-kicksecure" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Based on Kicksecure" src="/w/images/thumb/2/27/Kicksecure-promo.jpg/600px-Kicksecure-promo.jpg" /></span>
  <p>
    Decades of research by the security community lead to many best practices. Whonix is based on
    <a href="https://www.kicksecure.com" target="_blank">Kicksecure</a>
    which is a security-hardened Linux distribution
    that implements the consensus of these reasonable security measures.
  </p>
</div>

<div id="modal-explain-kernel" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Security Hardened Linux" src="/w/images/thumb/8/8d/Tux-halo-promo.jpg/600px-Tux-halo-promo.jpg" /></span>
  <p>
    Whonix <a href="/wiki/Trademark_Policy">®</a> is based on <a href="https://www.kicksecure.com" target="_blank">Kicksecure</a> ™ which is a
    security-hardened Linux distribution, that uses
    <a href="https://github.com/Kicksecure/security-misc" target="_blank">strong Kernel Hardening Settings</a>
    as recommended by the Kernel Self Protection Project (KSPP).
  </p>
</div>

<div id="modal-explain-firewall" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Advanced Firewall" src="/w/images/thumb/8/82/Firewall-symbol.png/600px-Firewall-symbol.png" /></span>
  <p>
    Our <a href="/wiki/Firewall">Whonix-Firewall</a>
 is configured specifically for anonymously and securely using the Internet.
    It is configured for anonymous Tor use.
  </p>
</div>

<div id="modal-explain-keystrokes" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Keystroke Anonymizer" src="/w/images/thumb/8/81/Typing-fingerprint.jpg/600px-Typing-fingerprint.jpg" /></span>
  <p>
    <a href="/wiki/Keystroke_Deanonymization">Your typing style</a>
    can be used to track you. To prevent this, Whonix comes with
    <a href="/wiki/Keystroke_Deanonymization#Kloak">kloak</a>
    (a keystroke anonymizer) installed by default
  </p>
</div>

<!--
<div id="modal-explain-android" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Anbox for Android Apps"
      src="/w/images/thumb/1/1f/Anbox.jpg/600px-Anbox.jpg" /></span>
  <p>
    Run Android applications using
    <a href="/wiki/Anbox">Anbox</a>
    (outdated) or
    <a href="/wiki/Other_Operating_Systems#Whonix-Android-Workstation">Whonix-Custom-Workstation using Android x86</a>.
  </p>
</div>
-->

<div id="modal-explain-virus" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Malware Protection" src="/w/images/thumb/c/cf/Shield.png/600px-Shield.png" /></span>
  <p>
    Whonix provides additional security hardening measures and user education to provide better
    protection from
    <a href="/wiki/Malware">viruses / malware</a>.
  </p>
</div>

<div id="modal-explain-brute" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Brute Force Defense" src="/w/images/thumb/d/d7/Franck-v-_E1PQXKUkMw-unsplash.jpg/600px-Franck-v-_E1PQXKUkMw-unsplash.jpg" /></span>
  <p>
    Whonix protects Linux user accounts
    <a href="https://github.com/Kicksecure/security-misc" target="_blank">against brute force attacks</a>
    by using pam faillock.
  </p>
</div>

<div id="modal-explain-apparmor" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Apparmor against High Risk" src="/w/images/thumb/e/ec/AppArmor-logo-promo.png/600px-AppArmor-logo-promo.png" /></span>
  <p>
    <a href="/wiki/AppArmor">AppArmor</a> profiles restrict the
    capabilities of
    commonly used, high-risk applications such as Tor Browser.
  </p>
</div>

<div id="modal-explain-stream" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Stream Isolation" src="/w/images/thumb/c/cf/Stream-isolation-promo.jpg/600px-Stream-isolation-promo.jpg" /></span>
  <p>
    Distinct applications are routed through different paths in the
    <a href="/wiki/Why_does_Whonix_use_Tor">Tor network</a>. This is called
    <a href="/wiki/Stream_Isolation/Easy">Stream Isolation</a>.
  </p>
</div>

<div id="modal-explain-time" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Time Attack Defense" src="/w/images/thumb/6/6d/Stopwatch.jpg/600px-Stopwatch.jpg" /></span>
  <p>
    <a href="/wiki/Time_Attacks">Time attacks</a>
    on Whonix users are defeated by
    <a href="/wiki/Boot_Clock_Randomization">Boot Clock Randomization</a>
    and secure network time synchronization through
    <a href="/wiki/sdwdate">sdwdate</a>
    (Secure Distributed Web Date).
  </p>
</div>

<div id="modal-explain-secret" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Strong Organisational separation" src="/w/images/thumb/2/2e/Unknowable-promo.jpg/600px-Unknowable-promo.jpg" /></span>
  <p>
    Not even WE know. Whonix has a strong
    <a href="/wiki/Why_does_Whonix_use_Tor#Organisational_Separation">organisational separation</a>
    which means: Even we do not have access to IP connection logs!
  </p>
</div>

<div id="modal-explain-alltor" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="The Everything Tor OS" src="/w/images/thumb/e/ea/Tor-everything.jpg/600px-Tor-everything.jpg" /></span>
  <p>
    The Everything Tor OS.
    <a href="/wiki/About#Security_by_Isolation">All internet traffic is routed</a> through the
    <a href="/wiki/Why_does_Whonix_use_Tor">Tor anonymity network.</a>
    No exceptions. Whonix is the "All Tor Operating System".
  </p>
</div>

<div id="modal-explain-virtualizer" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Virtualizer Friendly" src="/w/images/thumb/4/42/Virtualizer-friendly-promo.jpg/600px-Virtualizer-friendly-promo.jpg" /></span>
  <p>
    Virtualizer Friendly. Since Whonix runs in a virtualizer
    <a href="/wiki/Protocol-Leak-Protection_and_Fingerprinting-Protection">it provides an abstraction layer</a>
    from the host operating system. This hides hardware serial numbers and prevents host file leaks.
  </p>
</div>

<div id="modal-explain-anonserver" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Anonymous Server" src="/w/images/thumb/2/28/Anonymous-server-promo.jpg/600px-Anonymous-server-promo.jpg" /></span>
  <p>
    Anonymously hosting a web server such as nginx (or any other type) is extremely difficult.
    Location / IP hidden servers are usually hosted using Tor onion services. The disadvantage is, that these are only
    reachable for users of Tor (such as Tor Browser or Whonix users).
    <a href="/wiki/Hosting_Location_Hidden_Services">
      With Whonix, it's possible to host a location / IP hidden server service while it's reachable over clearnet
    </a>.
    A very little known, but very unique and powerful feature.
  </p>
</div>

<!--
<div id="modal-explain-vanguards" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Vanguards against guard discovery and related traffic analysis attacks" src="/w/images/thumb/f/fd/Vanguard.png/600px-Vanguard.png" /></span>
  <p>
    Whonix provides
    <a href="/wiki/vanguards">vanguards</a>
    against guard discovery and related traffic analysis attacks.
  </p>
</div>
-->

<div id="modal-explain-account" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Linux User Account Separation" src="/w/images/thumb/8/87/Account-separation-promo.png/600px-Account-separation-promo.png" /></span>
  <p>
    Learn more about our 
    <a href="https://www.kicksecure.com/wiki/Dev/Strong_Linux_User_Account_Isolation" target="_blank">Linux User Account Separation</a>
    .
  </p>
</div>

<div id="modal-explain-settings" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Best Anynonmity Settings" src="/w/images/thumb/6/61/Preferences_system.png/600px-Preferences_system.png" /></span>
  <p>
    Learn more about our anonymity, privacy and security settings pre-configuration
    <a href="https://github.com/Whonix/anon-apps-config" target="_blank">anon-apps-config</a>
    .
  </p>
</div>

<div id="modal-explain-docs" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Extensive Documentation" src="/w/images/thumb/5/55/Advanceddocumentation213123.jpg/600px-Advanceddocumentation213123.jpg" /></span>
  <p>
    The more you know, the safer you can be:
    <a href="/wiki/Documentation">Extensive Whonix Documentation</a>
  </p>
</div>

<div id="modal-explain-community" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Vibrant Community" src="/w/images/thumb/a/af/Discourse_logo.png/600px-Discourse_logo.png" /></span>
  <p>
    Our vibrant Whonix community features
    <a href="https://forums.whonix.org" target="_blank">Forums</a>,
    <!-- <a href="https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/" target="_blank">Newsletter</a>, -->
    <a href="/wiki/Contributors">Contributors</a> and
    <a href="https://forums.whonix.org/c/news.rss" target="_blank">RSS</a>
  </p>
</div>

<div id="modal-explain-console" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Console Lockdown" src="/w/images/thumb/7/74/Console-lockdown.jpg/600px-Console-lockdown.jpg" /></span>
  <p>
    <a href="/wiki/Dev/Strong_Linux_User_Account_Isolation#Console_Lockdown">
      Console Lockdown
    </a>
    disables legacy login methods and thereby improves security hardening.
  </p>
</div>

<div id="modal-explain-torbrowser" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Tor Browser als Default" src="/w/images/thumb/d/d2/Torbrowser-promo.jpg/600px-Torbrowser-promo.jpg" /></span>
  <p>
    <a href="/wiki/Tor_Browser">Tor Browser</a> is optimized for anonymity and millions
    of daily users help you blend in with the crowd. Tor Browser provides protection from
    <a href="/wiki/Data_Collection_Techniques#Browser_Fingerprinting">browser fingerprinting</a>.
  </p>
  <p>
    Tor Browser is the only serious and actively developed browser designed and recommended for anonymity.
  </p>
  <p>
    The browser is fully featured because it is based on the modern and popular Mozilla Firefox browser, Visit any
    destination including modern websites such as YouTube.
  </p>
</div>

<div id="modal-explain-swap" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Swap File Creator" src="/w/images/thumb/7/7b/File-swap-promo.jpg/600px-File-swap-promo.jpg" /></span>
  <p>
    Running low on RAM isn't a security problem.
    <a href="https://github.com/Whonix/swap-file-creator" target="_blank">swap-file-creator</a>
    will create an encrypted swap file.
  </p>
</div>

<div id="modal-explain-entropy" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Entropy for better encryption" src="/w/images/thumb/e/ec/Entropy-promo.jpg/600px-Entropy-promo.jpg" /></span>
  <p>
    Better encryption thanks to
    <a href="/wiki/Dev/Entropy">preinstalled</a>
    random number generators.
  </p>
</div>

<div id="modal-explain-tirdad" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Tirdad kernel module for random ISN generation" src="/w/images/thumb/a/a9/Data-leak.jpg/600px-Data-leak.jpg" /></span>
  <p>
    Prevent
    <a target="_blank" class="external text" href="https://web.archive.org/web/20200427035537/https://dl.acm.org/doi/10.1145/1180405.1180410">
      de-anonymization of Tor onion services
    </a>
    via utilization of the
    <a target="_blank" class="external text" href="https://github.com/Kicksecure/tirdad">
      Tirdad kernel module for random ISN generation
    </a>.
  </p>
</div>

<div id="modal-explain-hidden" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Host Location Hidden Services" src="/w/images/thumb/0/07/Computer_n_screen.png/600px-Computer_n_screen.png" /></span>
  <p>
    Whonix is the safest way to
    <a href="/wiki/Hosting_Location_Hidden_Services">
      Host Location Hidden Services
    </a>
    /
    <a href="/wiki/Onion_Services">Onion Services</a>
    .
  </p>
</div>

<div id="modal-explain-observer" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Tor Ctlr Observer" src="/w/images/thumb/7/79/TorControl12312.png/600px-TorControl12312.png" /></span>
  <p>
    <a href="/wiki/Tor-ctrl-observer">tor-ctrl-observer</a> shows
    connection information of applications using Tor.
  </p>
</div>

<div id="modal-explain-canary" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Warrant Canary" src="/w/images/thumb/4/49/Canary-promo.jpg/600px-Canary-promo.jpg" /></span>
  <p>
    A
    <a href="/wiki/Trust#canary">canary</a>
    confirms that no warrants have ever been served on the Whonix project.
  </p>
</div>

<div id="modal-explain-debian" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Based on Debian" src="/w/images/thumb/3/30/Debian.png/600px-Debian.png" /></span>
  <p>
    In oversimplified terms, Whonix is just a collection of configuration files and scripts.
    Whonix is not a stripped down version of Debian; anything possible in "vanilla"
    Debian GNU/Linux can be replicated in Whonix.
    <a href="/wiki/About">About Whonix</a>
  </p>
</div>

<div id="modal-explain-signed" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Signed Downloads" src="/w/images/thumb/7/77/Key-lock-gpg.png/600px-Key-lock-gpg.png" /></span>
  <p>
    Downloads are
    <a href="/wiki/Verifying_Software_Signatures">signed</a>
    so genuine Whonix releases can be
    <a href="/wiki/Verify_the_Whonix_images">verified</a>.
  </p>
</div>

<!--{* 11.2. Values *}-->

<div id="modal-explain-success" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="12 years of success" src="/w/images/thumb/f/ff/Success-symbol.png/600px-Success-symbol.png" /></span>
  <p>
    Whonix has over 12 years of success. We have successfully protected our users from
    <a href="/wiki/Whonix_against_Real_Attacks#Everyday_Trackers">everyday trackers</a>
    and even from
    <a href="/wiki/Whonix_against_Real_Attacks">high level attacks</a>
    . With the next decade in mind, we are constantly improving Whonix' privacy and security.
  </p>
</div>

<div id="modal-explain-opensource" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Open Source" src="/w/images/thumb/0/09/Osi_standard_logo_0.png/600px-Osi_standard_logo_0.png" /></span>
  <p>
    All the <a href="https://github.com/Whonix" target="_blank">Whonix source code</a> is
    licensed under <a href="https://opensource.org/licenses/" target="_blank">OSI Approved
      Licenses</a>.
    We respect user rights to review, scrutinize, modify, and redistribute Whonix. This improves security
    and privacy for everyone.
  </p>
</div>

<div id="modal-explain-freedom" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Freedom Software" src="/w/images/thumb/a/a3/Heckert_gnu.big.png/600px-Heckert_gnu.big.png" /></span>
  <p>
    Whonix is
    <a href="/wiki/Reasons_for_Freedom_Software">Freedom Software</a>
    and contains software developed by the
    <a href="https://www.fsf.org/" target="_blank">Free Software Foundation</a>
    and the
    <a href="https://www.gnu.org" target="_blank">GNU Project</a>.
  </p>
</div>

<div id="modal-explain-research" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Research and Implementation Project" src="/w/images/thumb/7/7f/Cornues.png/600px-Cornues.png" /></span>
  <p>
    <a href="/wiki/What_we_do" title="Research">Research</a>
    and Implementation Project: Whonix makes modest claims and is wary of overconfidence.
    Whonix is an actively maintained research project making constant improvements; no
    <a href="/wiki/Warning" title="Warning">shortcomings</a>
    are ever hidden from users.
  </p>
</div>

<div id="modal-explain-auditable" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Fully auditable" src="/w/images/thumb/4/44/Bho78-4ycp0.jpg/600px-Bho78-4ycp0.jpg" /></span>
  <p>
    Whonix is independently verifiable by security experts and software developers around the world; you
    don’t have to trust developer claims.
    <a href="/wiki/Reasons_for_Freedom_Software">
      This improves security and privacy for everyone.
    </a>
  </p>
</div>

<div id="modal-explain-respect" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Complete respect for privacy and user freedom" src="/w/images/thumb/e/ef/Respect-freedom-symbol.jpg/600px-Respect-freedom-symbol.jpg" /></span>
  <p>
    Whonix respects data privacy principles. We don’t make advertising deals or collect sensitive
    personal data. There are
    <a href="/wiki/Reasons_for_Freedom_Software#No_Intentional_User_Freedom_Restrictions">
      no artificial restrictions imposed on possible system configurations
    </a>.
  </p>
</div>

<div id="modal-explain-sui-disabler" class="mini-modal section-modal">
  <span class="image-wrapper"><img decoding="async" loading="lazy" alt="SUI Disabler and Permission Hardener" src="/w/images/thumb/e/ed/Disablesuidbinary.jpg/600px-Disablesuidbinary.jpg" /></span>
  <p>
    The purpose of
    <a href="/wiki/SUID_Disabler_and_Permission_Hardener">
      SUID Disabler and Permission Hardener
    </a>
    is to enhance system security. It does this by strengthening the isolation of Linux user accounts,
    implementing stricter file permission settings, and decreasing potential security vulnerabilities by turning off SUID-enabled binaries.
  </p>
</div>