Skip to content
Step by Step Internet 馃寪 Guides for learning to surf the Net

Whonix What is it, what is it for and why is it one of the safest operating systems?

From each person’s perspective, according to the technological world and the way of use that we grant to a computer a secure operating system, it is important for any device that we use every day.

For these reasons, we have conducted specific research that can help you understand the quality and safety your equipment requires. In this article, we will show you the different features and operations that Whonix offers you.

Initially we will highlight its definition in a simple and determined way. In this way, you can understand the key parts of this software and the vitality that meets in the safety area

What is Whonix and what is this Linux distribution for?


For one more benefit in safety, come Whonix. On your website you can find a very different software that you can use efficiently for your computer. This distribution is based on Debian and Tor, in the same way, being an operating system that has a linked network traffic, but focused on privacy and anonymity.

Whonix it offers multiple advantages in terms of technical safety for each user. Specifically, your service applies the isolation security system, at the same time that Tor takes care of anonymize user routing on the Internet. Definitely, Whonix works through two virtual machines, which are responsible for creating a special protection layer to counteract malwares Y IP address leaks, guaranteeing security to the distribution of information that runs on the computer.

What are the special features that make Whonix one of the most secure OS?

This operating system is considered very secure in accordance with the different advanced security functions and full respect for the information it possesses.

These are its most notable features:

High Security

This software is based on “Kicksecure”, a Linux distribution that works on the computer to maintain the improved security. Count with one antivirus included with security measures that provide protection against viruses or malware that try to enter the computer.

Whonix brings with it the “Kernel self-protection configuration”. Its purpose is the core hardening, protecting user accounts from Linux against brute force attacks. This setting also has the ability to improve the miscellaneous security, avoiding the separation of user accounts.

Secured information

Thanks to the utility of Tor, the information distributed is kept hidden of the other users. Your safety increases with “Protection from information leaks”. Grants through a kernel module called “Tirdad” the ability to oppose CPU, TCP and ISN data leaks, through the Tor service and its anonymization.

Too has defenses against: data loss, search queries on encrypted network traffic, guard discovery, traffic analysis attacks and timing attacks, with the applications “Boot Clock Randomization, sdwdate, Kloak and Vanguard”

Secure accounts and applications

Another of the qualities that this operating system possesses is the “Anonymity, privacy and security settings”. This option allows you to change the settings of newly created and existing user accounts. The applications have a protection system against vulnerabilities called “AppArmor”. By default it has enabled the “Console lock” this option allows restrict the use of the console by any old login method.

How does Whonix work to protect our data?


The service provided by this software is divided into two virtual machines: workstation machine and gateway machine. Each machine is configured to check that the system is working properly on a daily basis. In particular a work station machine takes care of stay isolated from the internet and be able to operate safely.

While the other machine takes care of open a gateway that connects with the first, giving access to the Internet when necessary. Whonix opt for the support of Tor, acting through a machine as a gateway. Its function is to pass all connections through the Tor network ensuring all distributed data, so that any attacker is unable to access any type of information, and even the specific IP address.

Whonix vs Tor and Tails How is it different from both?

We previously indicated the role of Whonix on a computer, as well as its influence on security and its anonymity service included. However, being developed based on Tor and its similarity to Tails, we will show you one comparison of each of these operating systems and how they differ.

Let’s see below:

The Onion Router

First of all we have The Onion Router. This software was designed for a anonymous browsing communication. Tor consists of three network layers that distribute traffic.

First, it randomly connects to the first layer, bouncing the traffic to the second and redirecting it to the third output layer, wrapping the data in protected encryption. Unlike Whonix that adequately protects the IP address, this operating system does not completely cover anonymity on a computer, since only hides the traffic passing through the Tor network, leaving the remaining information on display.

The Amnesic Incognito Live System

Tails is a special uniqueness software. In comparison with Whonix, your system Linux is also based on Debian. Its function fulfills the objective of granting privacy and security to its users through the traffic of the Tor network, hiding any information that is being used on the computer.

On the other hand, Tails is not specifically installed on a computer, which means that this software is transported via USB or DVD and starts by default when inserted into a computer, that is, the entire operating system is on the USB.

Basic safety tips that you should apply once you install Whonix

To obtain better performance with Whonix, we bring you some safety tips that may be useful after installation:

Change default passwords

To the have the software installed is included automatically default passwords.

Next, we show you the following steps to change this configuration:

  • First open the terminal (Start menu-Applications-System-Terminal), and we log in as root.
  • Then we will see a note which will indicate the name of users and passwords to be changed. We click on the option to change the “Root password”And we follow the instructions indicated, we will repeat the same procedure to change the “User password”

Increase the RAM of the virtual machine

If you are operating Whonix-Workstation your system does not require any necessary changes. Unlike Whonix-Gateway, it is ideal to increase the 2048MB virtual RAM RAM for better performance. If you do not have a feasible amount of RAM, you can follow the steps offered by its official website

Update Tor

If you necessarily require a Tor browser update, it is vital that you follow each of these steps:

  • First, we open the browser and we click on the main menu.
  • Among the different options that we will see, we click on “reboot to update Tor browser “, it will immediately start downloading the required update.
  • When this process is finished, the browser will restart automatically, starting with the new settings.

Network time synchronization

It’s fundamental do not change this setting recommended, since the system clock that is in Whonix is set to UTC for avoid time zone leaks.

Enable sdwdate-gui

This service is recommended for better security, since enabling this setting will allow you to keep informed about the Tor network connection status and sdwdate progress.

We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners. View more
Cookies settings
Privacy & Cookie policy
Privacy & Cookies policy
Cookie name Active requests your consent to use your personal data for these purposes: Personalized ads and content, ad and content measurement, audience insights and product development. Storing or accessing information on a device Your personal data will be processed and information on your device (cookies, unique identifiers and other device data) may be stored, accessed and shared with third party vendors or used specifically by this website or application. Some providers may process your personal data on the basis of a legitimate interest, which you can object to by managing your choices below. Look for a link at the bottom of this page or in our privacy policy to revoke consent.
Save settings
Cookies settings