in

CryingCrying LoveLove AngryAngry WtfWtf

Simple Whonix Installation Tutorial

security

Updated July 18th, 2019

Whonix is an operating system focused on anonymity, privacy and security. It’s based on the Tor anonymity network and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user’s real IP. This makes it a safer way to access the Deep Web opposed to just using Tor on your current operating system. It is especially discouraged to be using Tor with a Windows operating system because of the direct access that the NSA has to Microsoft’s systems and the information that Microsoft is willing to hand over to them.

(Read more about the NSA and Microsoft)

whonix

Before using Whonix, it is helpful to understand how exactly it works. Whonix is made up of two parts. There is one that solely runs Tor and acts as a gateway, aptly called Whonix-Gateway. The second part which the user actually uses is called the Whonix-Workstation. It is on a completely isolated network that only allows connections through Tor. Both of these parts are run in their own virtual machines on your computer and this keeps what you docontained within Whonix.

To start you will first want to download VirtualBox. This will allow you to create the virtual machines for running Whonix on your computer. Then download both Whonix-Gateway and Workstation. There are a couple download options and you can choose which one you think is best. It is also suggested that you verify the images using the Signing Key if you understand how to do so. If not, you may want to learn how with the guide on PGP encryption.

After installing VirtualBox, open up the program and just follow a few simple steps:

  1. Click File > Import Appliance…
  2. Click “Choose” and select the downloaded Whonix-Gateway.ova file.
  3. Click next and then “Import” without changing any of the settings.
  4. Wait for the progress bar to complete the import.
  5. Repeat those steps for the Whonix-Workstation.ova file.
  6. Now start both the Whonix-Gateway and Whonix-Workstation.

For your first use you will have to go through a quick setup process and then wait for Whonix to search for and install any necessary updates. Keep in mind you will need to keep Whonix-Gateway running but you don’t actually use it for anything besides updating. You will conduct all your activities within the Whonix-Workstation virtual machine window.

Now you can use Whonix to browse in a safer and more secure way, all without having to make drastic changes to your computer.

What do you think?

145 points
Upvote Downvote

Written by Kofi Anash

security camera spying

Simple TAILS Installation

anonymity privacy

How to use Tor as a Socks5 Proxy for Almost Everything