Superior Internet Privacy with Whonix

As handy as an app - delivering maximum anonymity and security.

Download Now
Whonix overview preview Whonix overview

Learn What Is Whonix?

Whonix gives your desktop
check Maximum privacy and anonymity on the Internet
check More reliability and security than any other tool on the market!

Download, Install, Run - 100% FREE

Whonix runs like an app inside your operating system - keeping you safe and anonymous. Whonix is available for

Is Whonix safer than VPNs?

Whonix VPNs
Hidden IP address (basic) Your IP address acts as a global unique identifier which is linked to your real identity. Any website or server you are connecting to knows your IP address. Most Internet Service Providers (ISPs) keep a log of IP addresses assigned to you and when you used them. The IP address reveals your approximate physical location to any destination you connect to. YES YES
Hidden Identity Even if your IP is hidden trackers can use "Fingerprinting" techniques to identify you.

Hiding your identity is harder than just hiding your IP!

Whonix protects from browser fingerprinting, and website traffic fingerprinting.
YES NO
No Logging Whonix cannot log user IP addresses or activity. This is due to a fundamental architecture design decision to keep maximum user privacy.

Most VPNs have a policy of not storing any user data. But if they were forced to do so they could start storing user data easily.
By Design By Policy
Leak Shield Even if a connection is tunneled it can be hijacked inside the browser. One leaky connection already compromises the user's anonymity. Whonix has a watertight leak shield.

Some VPN providers also have a fail-closed mechanism however the quality varies very much and fails against malware.
YES Limited
Server Relays avg. The servers used for tunneling MUST NOT know the user. This is only possible if there are multiple and independent servers as relays on a strict need-to-know basis and onion-layered encryption.

Some VPN providers provide double VPN but it’s still the same provider and lacks distributed trust by design.
3 1
Virus / Malware Protection A malware (virus) free system is crucial because a lot malware is stealing the user's data and identity. Whonix is based on Kicksecure, a hardened, well documented Linux so the user is already safer.

Some VPN subscriptions contain anti-malware scanners but their capability is limited . A better approach is to prevent any malware from entering the system through security hardening and knowledge.
YES SOME
Compare more features ▼ ... ...
Keyboard Typing Cloak Trackers can identify their targets by their keyboard typing style. Whonix prevents this kind of attack. YES NO
Timestamp Attack Protection Trackers can identify their targets by minimal divergence from the standard time in the network requests called time attacks. Whonix prevents this kind of attack. YES NO
App Stream Isolation In Whonix distinct pre-installed applications are routed through different network paths for maximum security. YES NO
Open Source / Freedom Whonix has a full dedication to Open Source and Freedom Software. Only some VPNs have open source elements and even less are fully Open Source. YES SOME
Pricing FREE or
Donation
$5 - $20
per month
Download
Whonix now!

Learn More: Whonix versus VPNs

Watertight Privacy Architecture

Whonix functionality illustration

Whonix handles all your activity in a virtual machine, forcing all Internet traffic through the Tor network, providing reliable IP hiding and the strongest protection for your IP address.

Fully Featured with Advanced Security Components

22 more amazing features →

Time Attack Protection

Time Attack Protection

Sophisticated attackers can identify you by the milliseconds that your system clock deviates from standard time. Whonix prevents this.

Strong organisational separation

Not even WE know

Whonix has a strong organisational separation which means: Even we do not have access to IP connection logs!

The Everything Tor OS

The Everything Tor OS

All traffic is routed through the Tor anonymity network. No exceptions. Whonix is the "All Tor Operating System".

Virtualizer friendly

Virtualizer friendly

Since Whonix runs in a virtualizer it provides an abstraction layer from the host operating system. This hides hardware serial numbers and prevents host file leaks.

Anonymous Web Server

Anonymous Web Server

Anonymously hosting a web server such as nginx is extremely difficult. With Whonix it's possible to host an IP hidden server, even for clearnet access!

Tor Browser as Standard

Tor Browser

Tor Browser is optimized for anonymity, provides protection from browser fingerprinting. And millions of daily users help you blend in with the crowd. Anonymity loves company.

Kernel Self Protection Settings

Kernel Self Protection Settings

Whonix uses strong Kernel Hardening Settings as recommended by the Kernel Self Protection Project (KSPP).

Live Mode

Live Mode

Booting into Live Mode is as simple as choosing Live Mode in the boot menu. After the session, all data will be gone.

Based on Linux

Based on Linux

Linux is highly reliable, secure, free and open source. That's why Whonix is based on Kicksecure which is based on Linux.

Onion Website Option

Onion Website Option

Our website offers an alternative onion version. This offers a higher connection security between the user and the server.

Advanced Firewall

Advanced Firewall

Our Firewall is configured specifically for anonymously and securely using the Internet.

Virus Protection

Virus Protection

Whonix provides additional security hardening measures and user education for better protection from virus attacks.

Brute Force Defense

Brute Force Defense

Whonix protects Linux user accounts against brute force attacks by using pam faillock.

Risk Minimization

Risk Minimization

AppArmor profiles restrict the capabilities of commonly used, high-risk applications.

Stream Isolation

Stream Isolation

Distinct applications are isolated and routed through different paths in the network.

Strong Linux User Account Separation

Strong Linux User Account Separation

Linux User Account Separation is not always a given on Linux systems. In Whonix it is.

Strong Anonymity

Strong Anonymity, privacy and security settings

Well researched and tested privacy and security settings improve your anonymity against known attacks.

Extensive Documentation

Extensive Documentation

The more you know, the safer you can be: Extensive Whonix Documentation

Vibrant Community

Vibrant Community

Our vibrant Whonix community features Forums, Contributors and RSS.

Console Lockdown

Console Lockdown

Legacy login methods can be a security risk. Console Lockdown disables them for improved security hardening.

Swap File Creator

Swap File Creator

Running low on RAM isn't a security problem with swap-file-creator. It will create an encrypted swap file.

Entropy Enhancements

Entropy Enhancements

Better encryption thanks to preinstalled random number generators.

CPU Information Leak Protection

CPU Information Leak Protection (TCP ISN)

Prevent de-anonymization of Tor onion services via utilization of the Tirdad kernel module for random ISN generation.

Hosting Location Hidden Servers

Hosting Location Hidden Servers

Whonix is the safest way to Host Location Hidden Services / Onion Services.

Tor Connection Destination Viewer

Tor Connection Destination Viewer (tor-ctrl-observer)

tor-ctrl-observer shows connection information of applications using Tor.

Warrant Canary

Warrant Canary

A canary confirms that no warrants have ever been served on the Whonix project.

Based on Debian

Based on Debian

Whonix is based on Debian, one of the most reliable Linux distributions.

Digitally signed releases

Digitally signed releases

Downloads are signed so genuine Whonix releases can be verified.

Permission Hardener

SUID Disabler and Permission Hardener

SUID Disabler and Permission Hardener enhances system security by strengthening the isolation of Linux user accounts and more.