
Documentation
This documentation is a work in progress and a collective task. If you think it lacks documentation on a specific topic you can suggest us to complete it or try to write it yourself and share it with us.
Introduction to this documentation
- General information
- Very brief introduction and summary on Whonix Homepage
- Why do you need anonymity?
- The World Wide Web and your privacy
- Surveillance Capabilities
- Data Collection Techniques
- What Whonix can do
- Features
- System requirements
- Warnings!
- Non technical steps staying anonymous
- Whonix Security in Real World
- Comparison of Whonix, Tails, Tor Browser Bundle and TorVM
- Comparison of different Whonix variants
- Screenshots
- Trusting Whonix
- Fingerprint
- License
- Known bugs
- Very brief introduction and summary on Whonix Homepage
- Get Whonix
- First steps with Whonix
- Connect to the Internet anonymously
- Logging in to captive portals, Hotspot Wi-Fi registration
- Controlling Tor
- Browsing the web with Tor Browser
- Chatting
- Hosting Location/IP Hidden Servers
- Filesharing / BitTorrent
- E-Mail: Introduction, Webmail, Mozilla Thunderbird with TorBirdy
- rss reader (unfinished in Whonix - under development), subscribing to website and/or blog updates, rss to e-mail and rss to sms
- Anonymous Money, anonymously pay and receive money, Bitcoin, BTC (DRAFT!)
- Phone Calls, Voice over IP, Voip (UNFINISHED!)
- Accessing Other Anonymizing Services over Tor
- Logging in to captive portals, Hotspot Wi-Fi registration
- Encryption & privacy
- Tools
- Work on sensitive documents
- Tunnel Support
- Misc
- Unfinished
- Advanced topics
- Other Operating Systems such as Windows, Ubuntu, etc. torified by Whonix-Gateway
- Manually updating Tor Browser, temporary workaround, in case the torbrowser updater ever gets broken
- Download Security
- Replacing desktop environment
- Whonix using Physical Isolation, setup using two different computers AND virtualization. This is the most secure Tor configuration to date.
- Using Multiple Whonix-Workstations
- Advanced Security Guide
- Hide the fact, that you are using Tor/Whonix
- (encrypted) (authenticated) Connection Between Whonix-Gateway and Whonix-Workstation
- Technical Design
- Tunnel UDP over Tor (Workaround using VPNs)
- Virtual Box Guest Additions, Shared Folder (not recommend, for those who really know better)
- Grow Virtual Harddisk
- Secondary DNS resolver
- Authenticated DNS over Tor, DNSSEC over Tor
- Encrypted DNS over Tor, DNSCrypt by OpenDNS, httpsdnsd by JonDos
- OnionCat, GarliCat: Tunnel TCP, UDP, ICMP or any other protocol through Tor or i2p; IPv6, VPN-like, TAP/TUN tunneling device
- Hosting a (private) (obfuscated) bridge or (exit) relay
- Using Tor's SocksProxy in Whonix-Workstation (See [Stream Isolation].)
- Best possible protection against Identity correlation through circuit sharing (See [Stream Isolation].)
- Connect to a Tor Gateway on your local network using PPTP VPN
- File Transfer
- Tuning
- Manually Installing Whonix
- Other Virtualization Platforms
- Other Operating Systems such as Windows, Ubuntu, etc. torified by Whonix-Gateway
- Other
- Esoteric Stuff (only for advanced users)
License
Whonix Documentation wiki page Copyright (C) Amnesia <amnesia at boum dot org> Whonix Documentation wiki page Portions Copyright (C) 2012 adrelanos <adrelanos at riseup dot net> This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code. This is free software, and you are welcome to redistribute it under certain conditions; see the wiki source code for details.

We believe security software like Kicksecure needs to remain Open Source and independent. Would you help sustain and grow the project? Learn more about our 12 year success story and maybe DONATE!