<div class="sections-wrapper"> <!--{* ----------------- *}--> <!--{* 2. Section Banner *}--> <div class="section-banner"> <div class="inner-wrapper"> <h2 class="slogan">Superior Internet Privacy with Whonix</h2> <p class="sub-slogan">As handy as an app - delivering maximum anonymity and security.</p> <a href="/wiki/Download" class="call-to-action">Download Now</a> <div class="overview-image-and-video-player"> <input type="checkbox" id="hide-overview-image" aria-label="Hide Overview Image" autocomplete="off" /> <a href="/wiki/About" class="overview-image" title="Whonix Desktop"> <img class="overview-image-preview" fetchpriority="high" decoding="sync" loading="eager" alt="Whonix overview preview" width="800" height="450" src="/w/images/a/a5/HP-Hero-image-svg-preview.svg" /> <img fetchpriority="high" decoding="sync" loading="eager" alt="Whonix overview" width="800" height="450" src="/w/images/6/60/Hero-image-v2.jpg" srcset=" /w/images/thumb/6/60/Hero-image-v2.jpg/934px-Hero-image-v2.jpg 934w, /w/images/thumb/6/60/Hero-image-v2.jpg/900px-Hero-image-v2.jpg 900w, /w/images/thumb/6/60/Hero-image-v2.jpg/800px-Hero-image-v2.jpg 800w, /w/images/thumb/6/60/Hero-image-v2.jpg/768px-Hero-image-v2.jpg 768w, /w/images/thumb/6/60/Hero-image-v2.jpg/640px-Hero-image-v2.jpg 640w, /w/images/thumb/6/60/Hero-image-v2.jpg/512px-Hero-image-v2.jpg 512w, /w/images/thumb/6/60/Hero-image-v2.jpg/320px-Hero-image-v2.jpg 320w " sizes="(max-width: 1000px) 85vw, 934px" /> </a> <video preload="metadata" width="1280" height="720" controls> <source data-src="/videos/whonix-explainer.mp4" type="video/mp4" /> <track src="captions_en.vtt" kind="captions" srclang="en" label="English captions (not available, watch you YouTube instead of captions)"> Your browser does not support the video tag. </video> </div> <h2 class="learn-more">Learn <a href="/wiki/About">What Is Whonix?</a> </h2> <p class="explainer"> Whonix gives your desktop<br /> <img class="pos-2px-up" src="/w/images/thumb/2/2c/True.png/33px-True.png" alt="check" width="22" height="22" /> <b>Maximum privacy and anonymity</b> on the Internet<br /> <img class="pos-2px-up" src="/w/images/thumb/2/2c/True.png/33px-True.png" alt="check" width="22" height="22" /> <b>More reliability and security</b> than any other tool on the market! </p> </div> </div> <!--{* ------------------- *}--> <!--{* 3. Section Download *}--> <div id="download" class="section-download dark-section"> <div class="inner-wrapper"> <h2> Download, Install, Run - <a href="/wiki/Reasons_for_Freedom_Software">100% FREE</a> <span class="share-tooltip" data-anchor="download"></span> </h2> <p> Whonix <b>runs like an app</b> inside your operating system - <b>keeping you safe and anonymous</b>. Whonix is available for </p> <div class="col-container"> <div> <a href="/wiki/VirtualBox"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/e/ee/Windows_logo_-_2012.svg.png/128px-Windows_logo_-_2012.svg.png" alt="Download for Windows" /></span> <span>Windows</span> </a> </div> <div> <a href="/wiki/Linux"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/d/d9/Logo-linux-variety-500x500.png/128px-Logo-linux-variety-500x500.png" alt="Download for Linux" /></span> <span>Linux</span> </a> </div> <div> <a href="/wiki/MacOS"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/9/9e/Logo-apple-500x500.png/128px-Logo-apple-500x500.png" alt="Download for Mac" /></span> <span>MacOS</span> </a> </div> <div> <a href="/wiki/Qubes"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/9/94/Qubes-logo-blue.png/128px-Qubes-logo-blue.png" alt="Download for Qubes" /></span> <span>Qubes</span> </a> </div> <div> <a href="/wiki/KVM"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/0/0f/Kvm-new-logo.png/128px-Kvm-new-logo.png" alt="Download for KVM" /></span> <span>KVM</span> </a> </div> <div> <a href="/wiki/Whonix_on_USB"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/5/5c/Logo-usb-500x500.png/128px-Logo-usb-500x500.png" alt="Whonix on USB" /></span> <span>On USB</span> </a> </div> <div> <a href="/wiki/Whonix-Host"> <span class="image-wrapper"> <img decoding="async" loading="lazy" class="image" src="/w/images/thumb/a/a5/Cd-rom-icon.png/128px-Cd-rom-icon.png" alt="Whonix ISO" /> <img decoding="async" loading="lazy" class="image coming-soon" src="/w/images/thumb/4/4f/Coming-soon.png/100px-Coming-soon.png" alt="Coming Soon" /> </span> <span>ISO</span> </a> </div> </div> </div> </div> <!--{* ------------------------ *}--> <!--{* 3A. Section Competition *}--> <div id="vpn" class="section-competition"> <div class="inner-wrapper"> <h2> Is Whonix <b>safer</b> than VPNs? <span class="share-tooltip" data-anchor="vpn"></span> </h2> <table> <tr> <th class="empty"></th> <th class="whonix top">Whonix</th> <th class="vpn top">VPNs</th> </tr> <tr> <th class="cat top"> <i class="fa-solid fa-mask"></i> Hidden IP address (basic) <span class="info-tooltip"> <span> Your <a href=/wiki/Data_Collection_Techniques#IP_Address>IP address</a> acts as a global unique identifier which is linked to your real identity. Any website or server you are connecting to knows your IP address. Most Internet Service Providers (ISPs) keep a log of IP addresses assigned to you and when you used them. The IP address reveals your approximate physical location to any destination you connect to. </span> </span> </th> <td class="whonix"><img decoding="async" loading="lazy" src="/w/images/thumb/2/2c/True.png/30px-True.png" alt="YES" width="30" height="30" /></td> <td class="vpn"><img decoding="async" loading="lazy" src="/w/images/thumb/2/2c/True.png/30px-True.png" alt="YES" width="30" height="30" /></td> </tr> <tr> <th class="cat"> <i class="fa-solid fa-user-secret"></i> Hidden Identity <span class="info-tooltip"> <span> Even if your IP is hidden trackers can use <b>"Fingerprinting"</b> techniques to identify you. <br /><br /> Hiding your <b>identity</b> is harder than just hiding your IP! <br /><br /> Whonix <a href="#security">protects</a> from <a href="/wiki/Data_Collection_Techniques#Browser_Fingerprinting">browser fingerprinting</a>, and <a href="/wiki/Fingerprint#Website_Traffic_Fingerprinting">website traffic fingerprinting</a>. </span> </span> </th> <td class="whonix"><img decoding="async" loading="lazy" src="/w/images/thumb/2/2c/True.png/30px-True.png" alt="YES" width="30" height="30" /></td> <td class="vpn"><img decoding="async" loading="lazy" src="/w/images/thumb/3/38/False.png/30px-False.png" alt="NO" width="30" height="30" /></td> </tr> <tr> <th class="cat"> <i class="fa-solid fa-phone-slash"></i> No Logging <span class="info-tooltip"> <span> Whonix cannot log user IP addresses or activity. This is due to a <a href="/wiki/About#architecture">fundamental architecture design</a> decision to keep maximum user privacy. <br /><br /> Most VPNs have a policy of not storing any user data. But if they were forced to do so <b>they could start storing user data easily</b>. </span> </span> </th> <td class="whonix"> <img decoding="async" loading="lazy" src="/w/images/thumb/2/2c/True.png/30px-True.png" alt="By Design" width="30" height="30" /> </td> <td class="vpn"> <img decoding="async" loading="lazy" src="/w/images/thumb/7/7e/5050.png/30px-5050.png" alt="By Policy" width="30" height="30" /> </td> </tr> <tr> <th class="cat"> <i class="fa-solid fa-tint"></i> Leak Shield <span class="info-tooltip"> <span> Even if a connection is tunneled it can be <b>hijacked inside the browser</b>. One leaky connection already compromises the user's anonymity. <a href="/wiki/About#Security_by_Isolation">Whonix has a watertight leak shield.</a> <br /><br /> Some VPN providers also have a fail-closed mechanism however the quality varies very much and fails against malware. </span> </span> </th> <td class="whonix"><img decoding="async" loading="lazy" src="/w/images/thumb/2/2c/True.png/30px-True.png" alt="YES" width="30" height="30" /></td> <td class="vpn"><img decoding="async" loading="lazy" src="/w/images/thumb/7/7e/5050.png/30px-5050.png" alt="Limited" width="30" height="30" /></td> </tr> <tr> <th class="cat"> <i class="fa-solid fa-share-alt"></i> Server Relays avg. <span class="info-tooltip"> <span> The servers used for tunneling MUST NOT know the user. This is only possible if there are <a href="/wiki/Why_does_Whonix_use_Tor#Multiple_Server_Hops"> <b>multiple</b> </a> and <a href="/wiki/Why_does_Whonix_use_Tor#Organisational_Separation"> <b>independent servers</b> </a> as relays on a <a href=/wiki/Why_does_Whonix_use_Tor#Need_to_Know_Architecture> strict need-to-know basis </a> and <a href=/wiki/Why_does_Whonix_use_Tor#Onion-Layered_Encryption>onion-layered encryption</a>. <br /><br /> Some VPN providers provide double VPN but it’s still <b>the same provider</b> and lacks distributed trust by design. </span> </span> </th> <td class="whonix"> 3 </td> <td class="vpn"> 1 </td> </tr> <tr> <th class="cat"> <i class="fa-solid fa-virus"></i> Virus / Malware Protection <span class="info-tooltip"> <span> A <a href="https://www.kicksecure.com/wiki/Malware_and_Firmware_Trojans" target="_blank"> malware (virus) </a> free system <a href="https://www.kicksecure.com/wiki/Malware_and_Firmware_Trojans#The_Importance_of_a_Malware_Free_System" target="_blank"> is crucial </a> because a lot malware is stealing the user's data and identity. <b>Whonix is based on Kicksecure</b>, a hardened, well documented Linux so the user is already safer. <br /><br /> Some VPN subscriptions contain anti-malware scanners but <a href="https://www.kicksecure.com/wiki/Malware_and_Firmware_Trojans#The_Utility_of_Antivirus_Tools" target="_blank"> their capability is limited </a>. A better approach is to prevent any malware from entering the system through security hardening and knowledge. </span> </span> </th> <td class="whonix"><img decoding="async" loading="lazy" src="/w/images/thumb/2/2c/True.png/30px-True.png" alt="YES" width="30" height="30" /></td> <td class="vpn"> <img decoding="async" loading="lazy" src="/w/images/thumb/7/7e/5050.png/30px-5050.png" alt="SOME" width="30" height="30" /> </td> </tr> <tr class="show-more hide-for-nojs-only"> <th class="cat">Compare more features ▼</td> <th class="whonix">...</td> <td class="vpn">...</td> </tr> <tr class="show-for-nojs-only"> <th class="cat"> <i class="fa-solid fa-keyboard"></i> Keyboard Typing Cloak <span class="info-tooltip"> <span> Trackers can identify their targets by their <b>keyboard typing style</b>. Whonix prevents this kind of attack. </span> </span> </th> <td class="whonix"> <img decoding="async" loading="lazy" src="/w/images/thumb/2/2c/True.png/30px-True.png" alt="YES" width="30" height="30" /> </td> <td class="vpn"> <img decoding="async" loading="lazy" src="/w/images/thumb/3/38/False.png/30px-False.png" alt="NO" width="30" height="30" /> </td> </tr> <tr class="show-for-nojs-only"> <th class="cat"> <i class="fa-regular fa-clock"></i> Timestamp Attack Protection <span class="info-tooltip"> <span> Trackers can identify their targets by <b>minimal divergence from the standard time in the network requests</b> called <a href="/wiki/Time_Attacks">time attacks</a>. Whonix <a href="/wiki/Time_Attacks#mitigations">prevents this kind of attack</a>. </span> </span> </th> <td class="whonix"> <img decoding="async" loading="lazy" src="/w/images/thumb/2/2c/True.png/30px-True.png" alt="YES" width="30" height="30" /> </td> <td class="vpn"> <img decoding="async" loading="lazy" src="/w/images/thumb/3/38/False.png/30px-False.png" alt="NO" width="30" height="30" /> </td> </tr> <tr class="show-for-nojs-only"> <th class="cat"> <i class="fa-solid fa-water"></i> App Stream Isolation <span class="info-tooltip"> <span> In Whonix distinct pre-installed applications are routed through different network paths for maximum security. </span> </span> </th> <td class="whonix"> <img decoding="async" loading="lazy" src="/w/images/thumb/2/2c/True.png/30px-True.png" alt="YES" width="30" height="30" /> </td> <td class="vpn"> <img decoding="async" loading="lazy" src="/w/images/thumb/3/38/False.png/30px-False.png" alt="NO" width="30" height="30" /> </td> </tr> <tr class="show-for-nojs-only"> <th class="cat"> <i class="fa-solid fa-code"></i> Open Source / Freedom <span class="info-tooltip"> <span> Whonix has a full dedication to <a href="/wiki/Reasons_for_Freedom_Software">Open Source and Freedom Software</a>. Only some VPNs have open source elements and even less are fully Open Source. </span> </span> </th> <td class="whonix"> <img decoding="async" loading="lazy" src="/w/images/thumb/2/2c/True.png/30px-True.png" alt="YES" width="30" height="30" /> </td> <td class="vpn"> <img decoding="async" loading="lazy" src="/w/images/thumb/7/7e/5050.png/30px-5050.png" alt="SOME" width="30" height="30" /> </td> </tr> <tr> <th class="cat bottom"> <i class="fa-solid fa-dollar-sign"></i> Pricing </th> <td class="whonix"> FREE or<br />Donation </td> <td class="vpn bottom"> $5 - $20<br />per month </td> </tr> <tr> <td class="empty"></td> <td class="whonix bottom"> <a href="/wiki/Download"> Download<br />Whonix now! </a> </td> <td class="empty"></td> </tr> </table> <p class="learn-more-vpns"> Learn More: <a href="/wiki/Whonix_versus_VPNs"> <i class="fa-solid fa-external-link-alt"></i> Whonix versus VPNs </a> </p> </div> </div> <!--{* ---------------- *}--> <!--{* 4. Section Press *}--> <div id="press" class="section-press"> <div class="inner-wrapper"> <h2> Trusted by Security Experts <span class="share-tooltip" data-anchor="press"></span> </h2> <div class="col-container cc-3 justify"> <a class="card-wrapper" draggable="false" href="https://web.archive.org/web/20140617105809/https://www.wired.com/2014/06/be-anonymous-online" target="_blank"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/e/e5/Wired.svg" alt="Wired Logo" /></span> <p> For the even more paranoid, there is a lesser-known Tor-enabled OS called Whonix </p> </a> <a class="card-wrapper" draggable="false" href="/wiki/Edward_Snowden_on_Whonix"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/4/44/Snowden.png/300px-Snowden.png" alt="Edward Snowden" /></span> <p> I use Qubes and a Whonix gateway literally everyday </p> </a> <a class="card-wrapper" draggable="false" href="https://web.archive.org/web/20130724032206/https://www.techrepublic.com/blog/smb-technologist/whonix-adds-a-layer-of-anonymity-to-your-business-tasks/" target="_blank"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/5/52/TechRepublic-ConvertImage.png/300px-TechRepublic-ConvertImage.png" alt="TechRepublic Logo" /></span> <p> Whonix adds a layer of anonymity to your business tasks. </p> </a> <a class="card-wrapper" draggable="false" href="https://web.archive.org/web/20150311120654/https://www.theguardian.com/technology/2015/mar/06/tips-tricks-anonymous-privacy" target="_blank"> <span class="image-wrapper"><img decoding="async" loading="lazy" src="/w/images/7/75/The_Guardian_2018.svg" class="image" alt="The Guardian Logo" /></span> <p> Whonix is about as anonymous as an OS can get before it all becomes too inconvenient for normal use. </p> </a> <a class="card-wrapper" draggable="false" href="https://evolution-host.com/" target="_blank"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/d/d6/Evolution-host-logo-text.svg" alt="evolution-host.com Logo" /></span> <p> All of our staff are aware, for anything privacy critical, Whonix is our go-to solution. Anybody who takes privacy serious should have a Whonix VM at least. </p> </a> <a class="card-wrapper" draggable="false" href="https://web.archive.org/web/20200704100018if_/https://theintercept.com/2015/09/16/getting-hacked-doesnt-bad/" target="_blank"> <span class="image-wrapper"><img decoding="async" loading="lazy" src="/w/images/1/14/The_Intercept_logo.svg" class="image" alt="The Intercept Logo" /></span> <p> Whonix, an operating system you can run in a virtual machine to maximize your online anonymity; it’s ideal for maintaining a secret identity. </p> </a> </div> <div class="mw-collapsible mw-collapsed slider-list-if-js" > <h3>See even more positive reviews →</h3> <div class="mw-collapsible-content"> <div class="col-container cc-3 justify"> <a class="card-wrapper" draggable="false" href="https://web.archive.org/web/2019*/https://www.chip.de/news/Whonix-bringt-Linux-Sicherheit-auf-Windows_151415693.html" target="_blank"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/6/60/640px-CHIP-Magazin-Logo.svg.png/300px-640px-CHIP-Magazin-Logo.svg.png" alt="Chip Logo" /></span> <p> Das linux-basierte Betriebs<wbr>system Whonix setzt von Anfang an auf Sicherheit. </p> </a> <a class="card-wrapper" draggable="false" href="https://www.hostingadvice.com/blog/whonix-os-is-preserving-internet-anonymity/" target="_blank"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/d/d0/Ha-logo-stacked-full.png/300px-Ha-logo-stacked-full.png" alt="HostingAdvice.com Logo" /></span> <p> Whonix protects user anonymity by routing internet connections through Tor’s network. </p> </a> <a class="card-wrapper" draggable="false" href="https://web.archive.org/web/20200321060503/https://www.heise.de/select/ct/2019/15/1563112584099766" target="_blank"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/4/4f/640px-Ct_logo.svg.png/300px-640px-Ct_logo.svg.png" alt="Ct Logo" /></span> <p> Tarnkappe - Mit Whonix anonym im Internet surfen </p> </a> <a class="card-wrapper" draggable="false" href="https://web.archive.org/web/20200321060403/https://www.heise.de/ratgeber/Mit-Whonix-anonym-im-Internet-surfen-4460100.html" target="_blank"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/b/bc/640px-Heise_online_logo.svg.png/300px-640px-Heise_online_logo.svg.png" alt="Heise Online Logo" /></span> <p> Viele Webseiten verfolgen ihre Besucher mit aus<wbr>ge<wbr>klü<wbr>gel<wbr>ten Trac<wbr>king<wbr>mecha<wbr>nis<wbr>men. Whonix macht Schluss damit, ohne dass man Browser-Einstellungen ändern muss. </p> </a> <a class="card-wrapper" draggable="false" href="https://web.archive.org/web/20200301165306/https://cybersecurity.att.com/blogs/security-essentials/how-does-whonix-make-kali-linux-anonymous-how-to-prevent-it" target="_blank"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/d/dd/AT_T_logo_2016.png/300px-AT_T_logo_2016.png" alt="AT&T Logo" /></span> <p> The Internet was not designed with anonymity in mind, but things have changed. Anonymity has become a necessary and legitimate objective in many applications. </p> </a> <a class="card-wrapper" draggable="false" href="https://web.archive.org/web/20200701181129/https://linuxsecurity.com/features/features/7-best-linux-distros-for-security-and-privacy-in-2020" target="_blank"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/9/93/Linux-security-logo-transparent.png/128px-Linux-security-logo-transparent.png" alt="LinuxSecurity.com Logo" /></span> <p> This split design allows the user to remain completely anonymous and mitigates the risk of DNS leaks, which reveal private information such as your web browsing history. </p> </a> </div> </div> </div> </div> </div> <!--{* ------------------ *}--> <!--{* 5. Section Explain *}--> <div id="explain" class="section-explain dark-section"> <div class="inner-wrapper"> <h2> Watertight Privacy Architecture <span class="share-tooltip" data-anchor="explain"></span> </h2> <a class="illustration" href="/wiki/About#Whonix_Architecture"> <span class="image-wrapper"> <img class="image" decoding="async" loading="lazy" width="780" height="395" src="/w/images/thumb/9/9d/Whonix-concept-illustration.png/800px-Whonix-concept-illustration.png" alt="Whonix functionality illustration" /> </span> </a> <p> Whonix handles all your activity in a virtual machine, forcing all Internet traffic through the <a href="/wiki/Why_does_Whonix_use_Tor">Tor network</a>, providing <a href="/wiki/Reliable_IP_Hiding">reliable IP hiding</a> and the strongest protection for your <a href="/wiki/Data_Collection_Techniques#IP_Address">IP address</a>. </p> </div> </div> <!--{* ------------------- *}--> <!--{* 7. Section Features *}--> <div id="security" class="section-features"> <div class="inner-wrapper"> <h2> Fully Featured with Advanced Security Components <span class="share-tooltip" data-anchor="security"></span> </h2> <div class="col-container cc-3 justify"> <a href="/wiki/About#Full_Spectrum_Anti-Tracking_Protection" class="card-wrapper" draggable="false" id="explain-spy"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Elite Spy Defense" src="/w/images/thumb/c/cb/Spy.jpg/300px-Spy.jpg" /></span> <h3>Elite Spy Defense</h3> <p> Hiding your identity is harder than just hiding your IP. Whonix provides a full spectrum anti-tracking protection. </p> </a> <a href="/wiki/Why_does_Whonix_use_Tor" class="card-wrapper" draggable="false" id="explain-tor"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Maximum Anonymity" src="/w/images/thumb/b/bb/Anonymous.jpg/300px-Anonymous.jpg" /></span> <h3>Maximum Anonymity</h3> <p> Whonix provides maximum anonymity by design by utilizing the best privacy technologies and research. </p> </a> <a href="/wiki/History" class="card-wrapper" draggable="false" id="explain-success"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="12 Years of Success" src="/w/images/thumb/2/20/10-year-promo.jpg/300px-10-year-promo.jpg" /></span> <h3>12 Years of Success</h3> <p> For over 12 years we have successfully protected our users from everyday trackers and even from high level attacks. And we're just getting started! </p> </a> <a href="https://www.kicksecure.com/" target="_blank" class="card-wrapper" draggable="false" id="explain-kicksecure"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Cyber Security Best Practices" src="/w/images/thumb/2/27/Kicksecure-promo.jpg/300px-Kicksecure-promo.jpg" /></span> <h3>Cyber Security Best Practices</h3> <p> You can't be anonymous without being secure. Security hardened operating system Kicksecure is the core of Whonix. </p> </a> <a href="/wiki/About#Whonix_Architecture" class="card-wrapper" draggable="false" id="explain-antileak"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Bulletproof IP protection" src="/w/images/thumb/c/cd/Matrix-s.jpg/300px-Matrix-s.jpg" /></span> <h3>Bulletproof IP protection</h3> <p> Whonix has powerful protection measures against trackers, malware and many more attack vectors to get your IP address. </p> </a> <a href="/wiki/Keystroke_Deanonymization" class="card-wrapper" draggable="false" id="explain-keystrokes"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Cloaking your typing style" src="/w/images/thumb/8/81/Typing-fingerprint.jpg/300px-Typing-fingerprint.jpg" /></span> <h3>Cloaking your typing style</h3> <p> Your typing behavior can be used to identify you. Whonix prevents this with a cloak for your keystrokes. </p> </a> </div> <div class="mw-collapsible mw-collapsed slider-list-if-js" > <h3>22 more amazing features →</h3> <div class="mw-collapsible-content"> <div class="col-container cc-3 justify"> <a href="/wiki/Dev/TimeSync" class="card-wrapper" draggable="false" id="explain-time"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Time Attack Protection" src="/w/images/thumb/6/6d/Stopwatch.jpg/300px-Stopwatch.jpg" /></span> <h3>Time Attack Protection</h3> <p> Sophisticated attackers can identify you by the milliseconds that your system clock deviates from standard time. Whonix prevents this. </p> </a> <a href="/wiki/Why_does_Whonix_use_Tor#Organisational_Separation" class="card-wrapper" draggable="false" id="explain-secret"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Strong organisational separation" src="/w/images/thumb/2/2e/Unknowable-promo.jpg/300px-Unknowable-promo.jpg" /></span> <h3>Not even WE know</h3> <p> Whonix has a strong organisational separation which means: Even we do not have access to IP connection logs! </p> </a> <a href="/wiki/Why_does_Whonix_use_Tor" class="card-wrapper" draggable="false" id="explain-alltor"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="The Everything Tor OS" src="/w/images/thumb/e/ea/Tor-everything.jpg/300px-Tor-everything.jpg" /></span> <h3>The Everything Tor OS</h3> <p> All traffic is routed through the Tor anonymity network. No exceptions. Whonix is the "All Tor Operating System". </p> </a> <a href="/wiki/Protocol-Leak-Protection_and_Fingerprinting-Protection" class="card-wrapper" draggable="false" id="explain-virtualizer"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Virtualizer friendly" src="/w/images/thumb/4/42/Virtualizer-friendly-promo.jpg/300px-Virtualizer-friendly-promo.jpg" /></span> <h3>Virtualizer friendly</h3> <p> Since Whonix runs in a virtualizer it provides an abstraction layer from the host operating system. This hides hardware serial numbers and prevents host file leaks. </p> </a> <a href="/wiki/Hosting_Location_Hidden_Services" class="card-wrapper" draggable="false" id="explain-anonserver"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Anonymous Web Server" src="/w/images/thumb/2/28/Anonymous-server-promo.jpg/300px-Anonymous-server-promo.jpg" /></span> <h3>Anonymous Web Server</h3> <p> Anonymously hosting a web server such as nginx is extremely difficult. With Whonix it's possible to host an IP hidden server, even for clearnet access! </p> </a> <a href="/wiki/Tor_Browser" class="card-wrapper" draggable="false" id="explain-torbrowser"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Tor Browser as Standard" src="/w/images/thumb/d/d2/Torbrowser-promo.jpg/300px-Torbrowser-promo.jpg" /></span> <h3>Tor Browser</h3> <p> Tor Browser is optimized for anonymity, provides protection from browser fingerprinting. And millions of daily users help you blend in with the crowd. Anonymity loves company. </p> </a> <a href="https://github.com/Kicksecure/security-misc" target="_blank" class="card-wrapper" draggable="false" id="explain-kernel"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Kernel Self Protection Settings" src="/w/images/thumb/8/8d/Tux-halo-promo.jpg/300px-Tux-halo-promo.jpg" /></span> <h3>Kernel Self Protection Settings</h3> <p> Whonix uses strong Kernel Hardening Settings as recommended by the Kernel Self Protection Project (KSPP). </p> </a> <a href="/wiki/VM_Live_Mode" class="card-wrapper" draggable="false" id="explain-livemode"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover image-left" alt="Live Mode" src="/w/images/thumb/d/d9/Whonix-live-mode.jpg/300px-Whonix-live-mode.jpg" /></span> <h3>Live Mode</h3> <p> Booting into Live Mode is as simple as choosing Live Mode in the boot menu. After the session, all data will be gone. </p> </a> <a href="https://www.kicksecure.com" target="_blank" class="card-wrapper" draggable="false" id="explain-linuxbased"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Based on Linux" src="/w/images/thumb/7/7d/Linux-based-whonix-promo.jpg/300px-Linux-based-whonix-promo.jpg" /></span> <h3>Based on Linux</h3> <p> Linux is highly reliable, secure, free and open source. That's why Whonix is based on Kicksecure which is based on Linux. </p> </a> <a href="/wiki/Forcing_.onion_on_Project" class="card-wrapper" draggable="false" id="explain-onionwebsite"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" src="/w/images/thumb/3/33/Onion-website-promo.jpg/300px-Onion-website-promo.jpg" alt="Onion Website Option" /></span> <h3>Onion Website Option</h3> <p> Our website offers an alternative onion version. This offers a higher connection security between the user and the server. </p> </a> <a href="/wiki/Advanced_Documentation" class="card-wrapper" draggable="false" id="explain-firewall"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" alt="Advanced Firewall" src="/w/images/thumb/8/82/Firewall-symbol.png/300px-Firewall-symbol.png" /></span> <h3>Advanced Firewall</h3> <p> Our Firewall is configured specifically for anonymously and securely using the Internet. </p> </a> <!-- <a href="/wiki/Anbox" class="card-wrapper" draggable="false" id="explain-android"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" alt="Android App Support" src="/w/images/thumb/1/1f/Anbox.jpg/300px-Anbox.jpg" /></span> <h3>Android App Support</h3> <p> Run Android applications using Anbox or Whonix-Custom-Workstation using Android. </p> </a> --> <a href="/wiki/Malware" class="card-wrapper" draggable="false" id="explain-virus"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" alt="Virus Protection" src="/w/images/thumb/c/cf/Shield.png/300px-Shield.png" /></span> <h3>Virus Protection</h3> <p> Whonix provides additional security hardening measures and user education for better protection from virus attacks. </p> </a> <a href="https://github.com/Kicksecure/security-misc" target="_blank" class="card-wrapper" draggable="false" id="explain-brute"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Brute Force Defense" src="/w/images/thumb/d/d7/Franck-v-_E1PQXKUkMw-unsplash.jpg/300px-Franck-v-_E1PQXKUkMw-unsplash.jpg" /></span> <h3>Brute Force Defense</h3> <p> Whonix protects Linux user accounts against brute force attacks by using pam faillock. </p> </a> <a href="/wiki/AppArmor" class="card-wrapper" draggable="false" id="explain-apparmor"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" alt="Risk Minimization" src="/w/images/thumb/e/ec/AppArmor-logo-promo.png/300px-AppArmor-logo-promo.png" /></span> <h3>Risk Minimization</h3> <p> AppArmor profiles restrict the capabilities of commonly used, high-risk applications. </p> </a> <a href="/wiki/Why_does_Whonix_use_Tor" class="card-wrapper" draggable="false" id="explain-stream"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" alt="Stream Isolation" src="/w/images/thumb/c/cf/Stream-isolation-promo.jpg/450px-Stream-isolation-promo.jpg" /></span> <h3>Stream Isolation</h3> <p> Distinct applications are isolated and routed through different paths in the network. </p> </a> <!-- <a href="/wiki/vanguards" class="card-wrapper" draggable="false" id="explain-vanguards"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" alt="Discovery / Traffic Analysis Attack Protection" src="/w/images/thumb/f/fd/Vanguard.png/300px-Vanguard.png" /></span> <h3>Discovery / Traffic Analysis Attack Protection</h3> <p> Whonix provides vanguards against guard discovery and related traffic analysis attacks. </p> </a> --> <a href="https://github.com/Kicksecure/security-misc" target="_blank" class="card-wrapper" draggable="false" id="explain-account"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" alt="Strong Linux User Account Separation" src="/w/images/thumb/8/87/Account-separation-promo.png/300px-Account-separation-promo.png" /></span> <h3>Strong Linux User Account Separation</h3> <p> Linux User Account Separation is not always a given on Linux systems. In Whonix it is. </p> </a> <a href="https://github.com/Whonix/anon-apps-config" target="_blank" class="card-wrapper" draggable="false" id="explain-settings"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" alt="Strong Anonymity" src="/w/images/thumb/6/61/Preferences_system.png/300px-Preferences_system.png" /></span> <h3>Strong Anonymity, privacy and security settings</h3> <p> Well researched and tested privacy and security settings improve your anonymity against known attacks. </p> </a> <a href="/wiki/Documentation" class="card-wrapper" draggable="false" id="explain-docs"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Extensive Documentation" src="/w/images/thumb/5/55/Advanceddocumentation213123.jpg/300px-Advanceddocumentation213123.jpg" /></span> <h3>Extensive Documentation</h3> <p> The more you know, the safer you can be: Extensive Whonix Documentation </p> </a> <a href="https://forums.whonix.org" target="_blank" class="card-wrapper" draggable="false" id="explain-community"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" alt="Vibrant Community" src="/w/images/thumb/a/af/Discourse_logo.png/300px-Discourse_logo.png" /></span> <h3>Vibrant Community</h3> <p> Our vibrant Whonix community features Forums, Contributors and RSS. </p> </a> <a href="/wiki/Dev/Strong_Linux_User_Account_Isolation#Console_Lockdown" class="card-wrapper" draggable="false" id="explain-console"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Console Lockdown" src="/w/images/thumb/7/74/Console-lockdown.jpg/300px-Console-lockdown.jpg" /></span> <h3>Console Lockdown</h3> <p> Legacy login methods can be a security risk. Console Lockdown disables them for improved security hardening. </p> </a> <a href="https://github.com/Whonix/swap-file-creator" target="_blank" class="card-wrapper" draggable="false" id="explain-swap"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" alt="Swap File Creator" src="/w/images/thumb/7/7b/File-swap-promo.jpg/450px-File-swap-promo.jpg" /></span> <h3>Swap File Creator</h3> <p> Running low on RAM isn't a security problem with swap-file-creator. It will create an encrypted swap file. </p> </a> <a href="/wiki/Dev/Entropy" class="card-wrapper" draggable="false" id="explain-entropy"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Entropy Enhancements" src="/w/images/thumb/e/ec/Entropy-promo.jpg/300px-Entropy-promo.jpg" /></span> <h3>Entropy Enhancements</h3> <p> Better encryption thanks to preinstalled random number generators. </p> </a> <a href="https://github.com/Kicksecure/tirdad" target="_blank" class="card-wrapper" draggable="false" id="explain-tirdad"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="CPU Information Leak Protection" src="/w/images/thumb/a/a9/Data-leak.jpg/300px-Data-leak.jpg" /></span> <h3>CPU Information Leak Protection (TCP ISN)</h3> <p> Prevent de-anonymization of Tor onion services via utilization of the Tirdad kernel module for random ISN generation. </p> </a> <a href="/wiki/Hosting_Location_Hidden_Services" class="card-wrapper" draggable="false" id="explain-hidden"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" alt="Hosting Location Hidden Servers" src="/w/images/thumb/0/07/Computer_n_screen.png/300px-Computer_n_screen.png" /></span> <h3>Hosting Location Hidden Servers</h3> <p> Whonix is the safest way to Host Location Hidden Services / Onion Services. </p> </a> <a href="/wiki/Tor-ctrl-observer" class="card-wrapper" draggable="false" id="explain-observer"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" alt="Tor Connection Destination Viewer" src="/w/images/thumb/7/79/TorControl12312.png/300px-TorControl12312.png" /></span> <h3>Tor Connection Destination Viewer (tor-ctrl-observer)</h3> <p> tor-ctrl-observer shows connection information of applications using Tor. </p> </a> <a href="/wiki/Trust#canary" class="card-wrapper" draggable="false" id="explain-canary"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Warrant Canary" src="/w/images/thumb/4/49/Canary-promo.jpg/300px-Canary-promo.jpg?20220902121433" /></span> <h3>Warrant Canary</h3> <p> A canary confirms that no warrants have ever been served on the Whonix project. </p> </a> <a href="/wiki/About" class="card-wrapper" draggable="false" id="explain-debian"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/3/30/Debian.png/300px-Debian.png" alt="Based on Debian" /></span> <h3>Based on Debian</h3> <p> Whonix is based on Debian, one of the most reliable Linux distributions. </p> </a> <a href="/wiki/Verifying_Software_Signatures" class="card-wrapper" draggable="false" id="explain-signed"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/7/77/Key-lock-gpg.png/300px-Key-lock-gpg.png" alt="Digitally signed releases" /></span> <h3>Digitally signed releases</h3> <p> Downloads are signed so genuine Whonix releases can be verified. </p> </a> <a href="https://www.kicksecure.com/wiki/SUID_Disabler_and_Permission_Hardener" target="_blank" class="card-wrapper" draggable="false" id="explain-sui-disabler"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" src="/w/images/thumb/e/ed/Disablesuidbinary.jpg/300px-Disablesuidbinary.jpg" alt="Permission Hardener" /></span> <h3>SUID Disabler and Permission Hardener</h3> <p>SUID Disabler and Permission Hardener enhances system security by strengthening the isolation of Linux user accounts and more.</p> </a> </div> </div> </div> </div> </div> <!--{* ----------------- *}--> <!--{* 7.1. Section Apps *}--> <div class="section-apps"> <div class="inner-wrapper"> <h2> Applications that are reviewed and pre-configured in Whonix </h2> <div class="col-container cc-5"> <a href="/wiki/Tor_Browser"> <span class="image-wrapper"><img decoding="async" loading="lazy" src="/w/images/thumb/3/3a/Torbrowser_icon.png/64px-Torbrowser_icon.png" alt="Tor Browser Symbol" /></span> <span>Tor Browser</span> </a> <a href="/wiki/OnionShare"> <span class="image-wrapper"><img decoding="async" loading="lazy" src="/w/images/thumb/0/0d/OnionShare_logo.png/64px-OnionShare_logo.png" alt="OnionShare Symbol" /></span> <span>OnionShare</span> </a> <a href="/wiki/Encrypted_Email_with_Thunderbird_and_Enigmail"> <span class="image-wrapper"><img decoding="async" loading="lazy" src="/w/images/thumb/b/b1/Thunderbird256.png/64px-Thunderbird256.png" alt="Encrypted Email Symbol" /></span> <span>Thunderbird</span> </a> <a href="/wiki/Passwords"> <span class="image-wrapper"><img decoding="async" loading="lazy" src="/w/images/thumb/5/51/KeePassXC.png/64px-KeePassXC.png" alt="KeePassXC Symbol" /></span> <span>KeePassXC</span> </a> <a href="/wiki/Software#Media_Player"> <span class="image-wrapper"><img decoding="async" loading="lazy" src="/w/images/thumb/c/cd/2000px-VLC_Icon.svg.png/64px-2000px-VLC_Icon.svg.png" alt="VLC Symbol" /></span> <span>VLC</span> </a> <a href="/wiki/Software#Terminal"> <span class="image-wrapper"><img decoding="async" loading="lazy" src="/w/images/thumb/c/c2/Utilities-terminal.png/64px-Utilities-terminal.png" alt="Terminal Symbol" /></span> <span>Terminal</span> </a> <a href="/wiki/Electrum"> <span class="image-wrapper"><img decoding="async" loading="lazy" src="/w/images/thumb/6/63/Electrum-appimage.png/64px-Electrum-appimage.png" alt="Electrum Symbol" /></span> <span>Electrum</span> </a> <a href="/wiki/Bitcoin"> <span class="image-wrapper"><img decoding="async" loading="lazy" src="/w/images/thumb/2/29/BC_Logo_.png/64px-BC_Logo_.png" alt="Bitcoin Symbol" /></span> <span>Bitcoin</span> </a> <a href="/wiki/Monero"> <span class="image-wrapper"><img decoding="async" loading="lazy" src="/w/images/thumb/0/05/Monero-symbol-1280.png/64px-Monero-symbol-1280.png" alt="Monero Symbol" /></span> <span>Monero</span> </a> </div> </div> </div> <!--{* ------------------- *}--> <!--{* 7.2. Section Values *}--> <div id="values" class="section-values"> <div class="inner-wrapper"> <h2> Freedom Values <span class="share-tooltip" data-anchor="values"></span> </h2> <div class="col-container cc-3 justify"> <a href="https://github.com/Whonix" target="_blank" class="card-wrapper" draggable="false" id="explain-opensource"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" alt="Open Source" src="/w/images/thumb/0/09/Osi_standard_logo_0.png/300px-Osi_standard_logo_0.png" /></span> <h3>Open Source</h3> <p> We respect user rights to review, scrutinize, modify, and redistribute Whonix. This improves security and privacy for everyone. </p> </a> <a href="/wiki/Reasons_for_Freedom_Software" class="card-wrapper" draggable="false" id="explain-freedom"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" alt="Freedom Software" src="/w/images/thumb/a/a3/Heckert_gnu.big.png/300px-Heckert_gnu.big.png" /></span> <h3>Freedom Software</h3> <p> Whonix is Freedom Software and contains software developed by the Free Software Foundation and the GNU Project. </p> </a> <a href="/wiki/What_we_do" class="card-wrapper" draggable="false" id="explain-research"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image" src="/w/images/thumb/7/7f/Cornues.png/300px-Cornues.png" alt="Research and Implementation Project" /></span> <h3>Research and Implementation Project</h3> <p> Whonix is an actively maintained research project making constant improvements; no shortcomings are ever hidden from users. </p> </a> <a href="/wiki/Reasons_for_Freedom_Software" class="card-wrapper" draggable="false" id="explain-auditable"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Fully Auditable" src="/w/images/thumb/4/44/Bho78-4ycp0.jpg/300px-Bho78-4ycp0.jpg" /></span> <h3>Fully Auditable</h3> <p> Whonix is independently verifiable by security experts and software developers around the world. This improves security and privacy for everyone. </p> </a> <a href="/wiki/Reasons_for_Freedom_Software#No_Intentional_User_Freedom_Restrictions" class="card-wrapper" draggable="false" id="explain-respect"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" alt="Complete respect for privacy and user freedom" src="/w/images/thumb/e/ef/Respect-freedom-symbol.jpg/300px-Respect-freedom-symbol.jpg" /></span> <h3>Complete respect for privacy and user freedom</h3> <p> Whonix respects data privacy principles. We don’t make advertising deals or collect sensitive personal data. </p> </a> </div> </div> </div> <!--{* ------------------- *}--> <!--{* 8. Section Upcoming *}--> <div id="upcoming" class="section-upcoming dark-section"> <div class="inner-wrapper"> <h2> Upcoming Security Enhancements <span class="share-tooltip" data-anchor="upcoming"></span> </h2> <div class="col-container cc-3 justify"> <!-- <a href="/wiki/Linux_Kernel_Runtime_Guard_LKRG" class="card-wrapper" draggable="false"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" src="/w/images/thumb/a/a7/P_lkrg2.png/300px-P_lkrg2.png" alt="LKRG" /></span> <p> Linux Kernel Runtime Guard (LKRG) performs runtime integrity checking of the Linux kernel and detection of security vulnerability exploits against the kernel. </p> </a> --> <!-- <a href="https://www.kicksecure.com/wiki/Hardened_Malloc_Light" target="_blank" class="card-wrapper" draggable="false"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" src="/w/images/thumb/a/a3/Kicksecurehardenedmalloc.jpg/300px-Kicksecurehardenedmalloc.jpg" alt="Hardened Malloc Light" /></span> <p> Hardened Malloc Light is a hardened memory allocator which can be used with many applications to increase security which is already installed by default and will be enabled by default. </p> </a> --> <a href="/wiki/Sandbox-app-launcher" class="card-wrapper" draggable="false"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" src="/w/images/thumb/6/60/Sandboxing123123.png/300px-Sandboxing123123.png" alt="Sandboxed Application Launcher" /></span> <p>sandbox-app-launcher is an application launcher that can start each application inside its own restrictive sandbox. Each application runs as its own user, in a bubblewrap sandbox and confined by AppArmor.</p> </a> </div> <div class="mw-collapsible mw-collapsed slider-list-if-js" > <h3>8 more Enhancements →</h3> <div class="mw-collapsible-content"> <div class="col-container cc-3 justify"> <a href="/wiki/Apparmor-profile-everything" target="_blank" class="card-wrapper" draggable="false"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" src="/w/images/thumb/7/79/Mandatoryaccesscontrol.jpg/300px-Mandatoryaccesscontrol.jpg" alt="AppArmor" /></span> <p>Full system Mandatory Access Control (MAC) policy - "AppArmor for everything"</p> </a> <a href="https://forums.whonix.org/t/untrusted-root-does-it-make-sense-to-try-to-improve-security-by-restricting-root/7998" target="_blank" class="card-wrapper" draggable="false"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" src="/w/images/thumb/5/53/Untrustedrootaccess.jpg/300px-Untrustedrootaccess.jpg" alt="Restricting root" /></span> <p>Untrusted Root User</p> </a> <!-- <a href="https://forums.whonix.org/t/allow-loading-signed-kernel-modules-by-default-disallow-kernel-module-loading-by-default/7880" target="_blank" class="card-wrapper" draggable="false"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image enforce-kernel" src="/w/images/thumb/e/e1/Verifykernel.png/300px-Verifykernel.png" alt="Kernel module Signatur" /></span> <p>Enforce kernel module software signature verification</p> </a> --> <a href="/wiki/Dev/VirusForget" class="card-wrapper" draggable="false"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image virus-forge" src="/w/images/thumb/d/da/Text_x_patch.png/300px-Text_x_patch.png" alt="Deactivate malware" /></span> <p>Deactivate malware after reboot from non-root compromise</p> </a> <a href="https://github.com/Kicksecure/hardened-kernel" target="_blank" class="card-wrapper" draggable="false"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" src="/w/images/thumb/6/6d/Hardenkernel.jpg/300px-Hardenkernel.jpg" alt="Hardened Kernel" /></span> <p>Hardened Linux Kernel</p> </a> <a href="https://forums.whonix.org/t/use-codecrypt-to-sign-whonix-releases/7844/2" target="_blank" class="card-wrapper" draggable="false"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" src="/w/images/thumb/9/90/Postquantum.jpg/300px-Postquantum.jpg" alt="Codecrypt" /></span> <p>Post-quantum cryptography resistant signing of releases</p> </a> <a href="https://forums.whonix.org/t/re-mount-home-and-other-with-noexec-and-nosuid-among-other-useful-mount-options-for-better-security/7707" target="_blank" class="card-wrapper" draggable="false"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" src="/w/images/thumb/7/7b/Mountoptions.jpg/300px-Mountoptions.jpg" alt="Mount Options Hardening" /></span> <p>Mount Options Hardening</p> </a> <a href="https://forums.whonix.org/t/multiple-boot-modes-for-better-security-persistent-root-persistent-noroot-live-root-live-noroot/7708" target="_blank" class="card-wrapper" draggable="false"> <span class="image-wrapper"><img decoding="async" loading="lazy" class="image image-cover" src="/w/images/thumb/7/7c/Multipleboot.jpg/300px-Multipleboot.jpg" alt="Boot Modes" /></span> <p>Multiple boot modes for better security (user, live, secureadmin and superadmin)</p> </a> </div> </div> </div> </div> </div> <!--{* --------------------- *}--> <!--{* 9. Section Investors *}--> <!-- <div id="investors" class="section-investor"> <div class="inner-wrapper"> <h2> Investors <span class="share-tooltip" data-anchor="investors"></span> </h2> <p> Interested in becoming an investor? See <a href="/wiki/Investors">Project Metrics and contact details</a>. </p> <a href="/wiki/Investors" class="image-link"> <img class="image" decoding="async" loading="lazy" src="/w/images/thumb/f/f7/Shaking-hands.jpg/800px-Shaking-hands.jpg" alt="Investor shaking hands" /> </a> </div> </div> --> <!--{* ---------------- *}--> <!--{* 10. Section Help *}--> <div id="contribute" class="section-help"> <div class="inner-wrapper"> <h2> Join the team! <span class="share-tooltip" data-anchor="contribute"></span> </h2> <div> <a href="/wiki/Contribute"> <img decoding="async" loading="lazy" class="image" src="/w/images/thumb/6/62/Digital-nomad.jpg/450px-Digital-nomad.jpg" alt="Help Welcome" /> <span><b>Your help is very welcome!</b> As a patron, as a multiplier or even as a contributor!</span> </a> </div> </div> </div> </div> <!--{* ---------- *}--> <!--{* 11. Modals *}--> <!--{* 11.1. Features *}--> <div id="modal-explain-antileak" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Anti Leak Protection" src="/w/images/thumb/1/17/Whonix-concept-detailed.jpg/600px-Whonix-concept-detailed.jpg" /></span> <p> Your IP gives away your identity. Cloaking your IP address is difficult because the Internet is not designed for privacy. Whonix solves this problem by forcing all connections through <a href="/wiki/Why_does_Whonix_use_Tor#Multiple_Server_Hops"> multiple anonymity servers </a> with <a href="/wiki/About#Security_by_Isolation"> its Dual-VM Architecture </a>. </p> <p> DNS leaks are impossible with Whonix. And even malware with root privileges cannot discover the user's real IP address. Whonix was thoroughly leak tested through <a href="https://github.com/Whonix/corridor" title="Corridor" target="_blank">corridor</a> (Tor traffic whitelisting gateway) and other <a href="/wiki/Dev/Leak_Tests">leak tests</a>. </p> </div> <div id="modal-explain-spy" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Strong Spy Defense" src="/w/images/thumb/c/cb/Spy.jpg/600px-Spy.jpg" /></span> <p> Internet tracking companies <a href=/wiki/About#Full_Spectrum_Anti-Tracking_Protection> don't even need to know your IP address </a> to be able to identify you. They use so-called <a href="/wiki/Data_Collection_Techniques#Browser_Fingerprinting">Browser Fingerprinting</a> which can track you even better than an IP address. </p> <p> Even your <a href="/wiki/Keystroke_Deanonymization">personal typing style</a> or <a href="/wiki/Time_Attacks">your individual computer time</a> can give away your identity. <a href="/wiki/Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider"> Every website has a unique fingerprint </a> so your Internet history is not even safe with a VPN. </p> </div> <div id="modal-explain-livemode" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Live Mode" src="/w/images/thumb/d/d9/Whonix-live-mode.jpg/600px-Whonix-live-mode.jpg" /></span> <p> Booting a VM into <a href="/wiki/Live_Mode">Live Mode</a> is as simple as choosing Live Mode in the boot menu. Alternatively, Debian, Kicksecure, and perhaps other Debian-based hosts can boot their existing host operating system into Live Mode. After the session, all data will be gone. </p> </div> <div id="modal-explain-linuxbased" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Based on Linux" src="/w/images/thumb/7/7d/Linux-based-whonix-promo.jpg/600px-Linux-based-whonix-promo.jpg" /></span> <p> Linux is highly reliable and secure. Its open source and freedom paradigm sets it apart from other OS. That's why Whonix is based on Kicksecure <a href="https://www.kicksecure.com" target="_blank"> which is based on Linux. </a> </p> </div> <div id="modal-explain-onionwebsite" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Onion Website Option" src="/w/images/thumb/3/33/Onion-website-promo.jpg/600px-Onion-website-promo.jpg" /></span> <p> Our website offers an alternative onion version which offers a higher connection security between the user and the server. This is because connections over onions are providing an alternative end-to-end encryption which is independent from <a href="/wiki/Forcing_.onion_on_Project"> flawed TLS certificate authorities </a> and the mainstream Domain Name System (DNS). </p> </div> <div id="modal-explain-tor" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Usage of Tor Network" src="/w/images/thumb/b/bb/Anonymous.jpg/600px-Anonymous.jpg" /></span> <p> Whonix utilizes <a href="/wiki/Why_does_Whonix_use_Tor">Tor, the best anonymity network</a>, which provides an open and distributed relay network to defend against network surveillance. </p> <p> Multiple server hops. Privacy by design. Need to know architecture. Onion-layered encryption. Unlike Virtual Private Networks (VPN), Tor provides anonymity by design and removes trust from the equation. </p> </div> <div id="modal-explain-kicksecure" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Based on Kicksecure" src="/w/images/thumb/2/27/Kicksecure-promo.jpg/600px-Kicksecure-promo.jpg" /></span> <p> Decades of research by the security community lead to many best practices. Whonix is based on <a href="https://www.kicksecure.com" target="_blank">Kicksecure</a> which is a security-hardened Linux distribution that implements the consensus of these reasonable security measures. </p> </div> <div id="modal-explain-kernel" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Security Hardened Linux" src="/w/images/thumb/8/8d/Tux-halo-promo.jpg/600px-Tux-halo-promo.jpg" /></span> <p> Whonix <a href="/wiki/Trademark_Policy">®</a> is based on <a href="https://www.kicksecure.com" target="_blank">Kicksecure</a> ™ which is a security-hardened Linux distribution, that uses <a href="https://github.com/Kicksecure/security-misc" target="_blank">strong Kernel Hardening Settings</a> as recommended by the Kernel Self Protection Project (KSPP). </p> </div> <div id="modal-explain-firewall" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Advanced Firewall" src="/w/images/thumb/8/82/Firewall-symbol.png/600px-Firewall-symbol.png" /></span> <p> Our <a href="/wiki/Firewall">Whonix-Firewall</a> is configured specifically for anonymously and securely using the Internet. It is configured for anonymous Tor use. </p> </div> <div id="modal-explain-keystrokes" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Keystroke Anonymizer" src="/w/images/thumb/8/81/Typing-fingerprint.jpg/600px-Typing-fingerprint.jpg" /></span> <p> <a href="/wiki/Keystroke_Deanonymization">Your typing style</a> can be used to track you. To prevent this, Whonix comes with <a href="/wiki/Keystroke_Deanonymization#Kloak">kloak</a> (a keystroke anonymizer) installed by default </p> </div> <!-- <div id="modal-explain-android" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Anbox for Android Apps" src="/w/images/thumb/1/1f/Anbox.jpg/600px-Anbox.jpg" /></span> <p> Run Android applications using <a href="/wiki/Anbox">Anbox</a> (outdated) or <a href="/wiki/Other_Operating_Systems#Whonix-Android-Workstation">Whonix-Custom-Workstation using Android x86</a>. </p> </div> --> <div id="modal-explain-virus" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Malware Protection" src="/w/images/thumb/c/cf/Shield.png/600px-Shield.png" /></span> <p> Whonix provides additional security hardening measures and user education to provide better protection from <a href="/wiki/Malware">viruses / malware</a>. </p> </div> <div id="modal-explain-brute" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Brute Force Defense" src="/w/images/thumb/d/d7/Franck-v-_E1PQXKUkMw-unsplash.jpg/600px-Franck-v-_E1PQXKUkMw-unsplash.jpg" /></span> <p> Whonix protects Linux user accounts <a href="https://github.com/Kicksecure/security-misc" target="_blank">against brute force attacks</a> by using pam faillock. </p> </div> <div id="modal-explain-apparmor" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Apparmor against High Risk" src="/w/images/thumb/e/ec/AppArmor-logo-promo.png/600px-AppArmor-logo-promo.png" /></span> <p> <a href="/wiki/AppArmor">AppArmor</a> profiles restrict the capabilities of commonly used, high-risk applications such as Tor Browser. </p> </div> <div id="modal-explain-stream" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Stream Isolation" src="/w/images/thumb/c/cf/Stream-isolation-promo.jpg/600px-Stream-isolation-promo.jpg" /></span> <p> Distinct applications are routed through different paths in the <a href="/wiki/Why_does_Whonix_use_Tor">Tor network</a>. This is called <a href="/wiki/Stream_Isolation/Easy">Stream Isolation</a>. </p> </div> <div id="modal-explain-time" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Time Attack Defense" src="/w/images/thumb/6/6d/Stopwatch.jpg/600px-Stopwatch.jpg" /></span> <p> <a href="/wiki/Time_Attacks">Time attacks</a> on Whonix users are defeated by <a href="/wiki/Boot_Clock_Randomization">Boot Clock Randomization</a> and secure network time synchronization through <a href="/wiki/sdwdate">sdwdate</a> (Secure Distributed Web Date). </p> </div> <div id="modal-explain-secret" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Strong Organisational separation" src="/w/images/thumb/2/2e/Unknowable-promo.jpg/600px-Unknowable-promo.jpg" /></span> <p> Not even WE know. Whonix has a strong <a href="/wiki/Why_does_Whonix_use_Tor#Organisational_Separation">organisational separation</a> which means: Even we do not have access to IP connection logs! </p> </div> <div id="modal-explain-alltor" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="The Everything Tor OS" src="/w/images/thumb/e/ea/Tor-everything.jpg/600px-Tor-everything.jpg" /></span> <p> The Everything Tor OS. <a href="/wiki/About#Security_by_Isolation">All internet traffic is routed</a> through the <a href="/wiki/Why_does_Whonix_use_Tor">Tor anonymity network.</a> No exceptions. Whonix is the "All Tor Operating System". </p> </div> <div id="modal-explain-virtualizer" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Virtualizer Friendly" src="/w/images/thumb/4/42/Virtualizer-friendly-promo.jpg/600px-Virtualizer-friendly-promo.jpg" /></span> <p> Virtualizer Friendly. Since Whonix runs in a virtualizer <a href="/wiki/Protocol-Leak-Protection_and_Fingerprinting-Protection">it provides an abstraction layer</a> from the host operating system. This hides hardware serial numbers and prevents host file leaks. </p> </div> <div id="modal-explain-anonserver" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Anonymous Server" src="/w/images/thumb/2/28/Anonymous-server-promo.jpg/600px-Anonymous-server-promo.jpg" /></span> <p> Anonymously hosting a web server such as nginx (or any other type) is extremely difficult. Location / IP hidden servers are usually hosted using Tor onion services. The disadvantage is, that these are only reachable for users of Tor (such as Tor Browser or Whonix users). <a href="/wiki/Hosting_Location_Hidden_Services"> With Whonix, it's possible to host a location / IP hidden server service while it's reachable over clearnet </a>. A very little known, but very unique and powerful feature. </p> </div> <!-- <div id="modal-explain-vanguards" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Vanguards against guard discovery and related traffic analysis attacks" src="/w/images/thumb/f/fd/Vanguard.png/600px-Vanguard.png" /></span> <p> Whonix provides <a href="/wiki/vanguards">vanguards</a> against guard discovery and related traffic analysis attacks. </p> </div> --> <div id="modal-explain-account" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Linux User Account Separation" src="/w/images/thumb/8/87/Account-separation-promo.png/600px-Account-separation-promo.png" /></span> <p> Learn more about our <a href="https://www.kicksecure.com/wiki/Dev/Strong_Linux_User_Account_Isolation" target="_blank">Linux User Account Separation</a> . </p> </div> <div id="modal-explain-settings" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Best Anynonmity Settings" src="/w/images/thumb/6/61/Preferences_system.png/600px-Preferences_system.png" /></span> <p> Learn more about our anonymity, privacy and security settings pre-configuration <a href="https://github.com/Whonix/anon-apps-config" target="_blank">anon-apps-config</a> . </p> </div> <div id="modal-explain-docs" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Extensive Documentation" src="/w/images/thumb/5/55/Advanceddocumentation213123.jpg/600px-Advanceddocumentation213123.jpg" /></span> <p> The more you know, the safer you can be: <a href="/wiki/Documentation">Extensive Whonix Documentation</a> </p> </div> <div id="modal-explain-community" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Vibrant Community" src="/w/images/thumb/a/af/Discourse_logo.png/600px-Discourse_logo.png" /></span> <p> Our vibrant Whonix community features <a href="https://forums.whonix.org" target="_blank">Forums</a>, <!-- <a href="https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/" target="_blank">Newsletter</a>, --> <a href="/wiki/Contributors">Contributors</a> and <a href="https://forums.whonix.org/c/news.rss" target="_blank">RSS</a> </p> </div> <div id="modal-explain-console" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Console Lockdown" src="/w/images/thumb/7/74/Console-lockdown.jpg/600px-Console-lockdown.jpg" /></span> <p> <a href="/wiki/Dev/Strong_Linux_User_Account_Isolation#Console_Lockdown"> Console Lockdown </a> disables legacy login methods and thereby improves security hardening. </p> </div> <div id="modal-explain-torbrowser" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Tor Browser als Default" src="/w/images/thumb/d/d2/Torbrowser-promo.jpg/600px-Torbrowser-promo.jpg" /></span> <p> <a href="/wiki/Tor_Browser">Tor Browser</a> is optimized for anonymity and millions of daily users help you blend in with the crowd. Tor Browser provides protection from <a href="/wiki/Data_Collection_Techniques#Browser_Fingerprinting">browser fingerprinting</a>. </p> <p> Tor Browser is the only serious and actively developed browser designed and recommended for anonymity. </p> <p> The browser is fully featured because it is based on the modern and popular Mozilla Firefox browser, Visit any destination including modern websites such as YouTube. </p> </div> <div id="modal-explain-swap" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Swap File Creator" src="/w/images/thumb/7/7b/File-swap-promo.jpg/600px-File-swap-promo.jpg" /></span> <p> Running low on RAM isn't a security problem. <a href="https://github.com/Whonix/swap-file-creator" target="_blank">swap-file-creator</a> will create an encrypted swap file. </p> </div> <div id="modal-explain-entropy" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Entropy for better encryption" src="/w/images/thumb/e/ec/Entropy-promo.jpg/600px-Entropy-promo.jpg" /></span> <p> Better encryption thanks to <a href="/wiki/Dev/Entropy">preinstalled</a> random number generators. </p> </div> <div id="modal-explain-tirdad" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Tirdad kernel module for random ISN generation" src="/w/images/thumb/a/a9/Data-leak.jpg/600px-Data-leak.jpg" /></span> <p> Prevent <a target="_blank" class="external text" href="https://web.archive.org/web/20200427035537/https://dl.acm.org/doi/10.1145/1180405.1180410"> de-anonymization of Tor onion services </a> via utilization of the <a target="_blank" class="external text" href="https://github.com/Kicksecure/tirdad"> Tirdad kernel module for random ISN generation </a>. </p> </div> <div id="modal-explain-hidden" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Host Location Hidden Services" src="/w/images/thumb/0/07/Computer_n_screen.png/600px-Computer_n_screen.png" /></span> <p> Whonix is the safest way to <a href="/wiki/Hosting_Location_Hidden_Services"> Host Location Hidden Services </a> / <a href="/wiki/Onion_Services">Onion Services</a> . </p> </div> <div id="modal-explain-observer" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Tor Ctlr Observer" src="/w/images/thumb/7/79/TorControl12312.png/600px-TorControl12312.png" /></span> <p> <a href="/wiki/Tor-ctrl-observer">tor-ctrl-observer</a> shows connection information of applications using Tor. </p> </div> <div id="modal-explain-canary" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Warrant Canary" src="/w/images/thumb/4/49/Canary-promo.jpg/600px-Canary-promo.jpg" /></span> <p> A <a href="/wiki/Trust#canary">canary</a> confirms that no warrants have ever been served on the Whonix project. </p> </div> <div id="modal-explain-debian" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Based on Debian" src="/w/images/thumb/3/30/Debian.png/600px-Debian.png" /></span> <p> In oversimplified terms, Whonix is just a collection of configuration files and scripts. Whonix is not a stripped down version of Debian; anything possible in "vanilla" Debian GNU/Linux can be replicated in Whonix. <a href="/wiki/About">About Whonix</a> </p> </div> <div id="modal-explain-signed" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Signed Downloads" src="/w/images/thumb/7/77/Key-lock-gpg.png/600px-Key-lock-gpg.png" /></span> <p> Downloads are <a href="/wiki/Verifying_Software_Signatures">signed</a> so genuine Whonix releases can be <a href="/wiki/Verify_the_Whonix_images">verified</a>. </p> </div> <!--{* 11.2. Values *}--> <div id="modal-explain-success" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="12 years of success" src="/w/images/thumb/f/ff/Success-symbol.png/600px-Success-symbol.png" /></span> <p> Whonix has over 12 years of success. We have successfully protected our users from <a href="/wiki/Whonix_against_Real_Attacks#Everyday_Trackers">everyday trackers</a> and even from <a href="/wiki/Whonix_against_Real_Attacks">high level attacks</a> . With the next decade in mind, we are constantly improving Whonix' privacy and security. </p> </div> <div id="modal-explain-opensource" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Open Source" src="/w/images/thumb/0/09/Osi_standard_logo_0.png/600px-Osi_standard_logo_0.png" /></span> <p> All the <a href="https://github.com/Whonix" target="_blank">Whonix source code</a> is licensed under <a href="https://opensource.org/licenses/" target="_blank">OSI Approved Licenses</a>. We respect user rights to review, scrutinize, modify, and redistribute Whonix. This improves security and privacy for everyone. </p> </div> <div id="modal-explain-freedom" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Freedom Software" src="/w/images/thumb/a/a3/Heckert_gnu.big.png/600px-Heckert_gnu.big.png" /></span> <p> Whonix is <a href="/wiki/Reasons_for_Freedom_Software">Freedom Software</a> and contains software developed by the <a href="https://www.fsf.org/" target="_blank">Free Software Foundation</a> and the <a href="https://www.gnu.org" target="_blank">GNU Project</a>. </p> </div> <div id="modal-explain-research" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Research and Implementation Project" src="/w/images/thumb/7/7f/Cornues.png/600px-Cornues.png" /></span> <p> <a href="/wiki/What_we_do" title="Research">Research</a> and Implementation Project: Whonix makes modest claims and is wary of overconfidence. Whonix is an actively maintained research project making constant improvements; no <a href="/wiki/Warning" title="Warning">shortcomings</a> are ever hidden from users. </p> </div> <div id="modal-explain-auditable" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Fully auditable" src="/w/images/thumb/4/44/Bho78-4ycp0.jpg/600px-Bho78-4ycp0.jpg" /></span> <p> Whonix is independently verifiable by security experts and software developers around the world; you don’t have to trust developer claims. <a href="/wiki/Reasons_for_Freedom_Software"> This improves security and privacy for everyone. </a> </p> </div> <div id="modal-explain-respect" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="Complete respect for privacy and user freedom" src="/w/images/thumb/e/ef/Respect-freedom-symbol.jpg/600px-Respect-freedom-symbol.jpg" /></span> <p> Whonix respects data privacy principles. We don’t make advertising deals or collect sensitive personal data. There are <a href="/wiki/Reasons_for_Freedom_Software#No_Intentional_User_Freedom_Restrictions"> no artificial restrictions imposed on possible system configurations </a>. </p> </div> <div id="modal-explain-sui-disabler" class="mini-modal section-modal"> <span class="image-wrapper"><img decoding="async" loading="lazy" alt="SUI Disabler and Permission Hardener" src="/w/images/thumb/e/ed/Disablesuidbinary.jpg/600px-Disablesuidbinary.jpg" /></span> <p> The purpose of <a href="/wiki/SUID_Disabler_and_Permission_Hardener"> SUID Disabler and Permission Hardener </a> is to enhance system security. It does this by strengthening the isolation of Linux user accounts, implementing stricter file permission settings, and decreasing potential security vulnerabilities by turning off SUID-enabled binaries. </p> </div>